diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..b66ae99 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +/.vs \ No newline at end of file diff --git a/.vs/Persons/config/applicationhost.config b/.vs/Persons/config/applicationhost.config index 860e194..da0dcb2 100644 --- a/.vs/Persons/config/applicationhost.config +++ b/.vs/Persons/config/applicationhost.config @@ -162,7 +162,7 @@ - + diff --git a/App_Code/SAML/PostResponse.aspx.vb b/App_Code/SAML/PostResponse.aspx.vb new file mode 100644 index 0000000..8c75b99 --- /dev/null +++ b/App_Code/SAML/PostResponse.aspx.vb @@ -0,0 +1,60 @@ +Namespace SAML + Partial Public Class PostResponse + Inherits System.Web.UI.Page + + Protected result As System.Web.UI.HtmlControls.HtmlGenericControl + + Protected Sub Page_Load(sender As Object, e As EventArgs) + Dim samlResponse = Request.Form("SAMLResponse") + If String.IsNullOrEmpty(samlResponse) Then + result.InnerHtml = "

No SAML Response found

" + Return + End If + + Dim cert As String = _ + "-----BEGIN CERTIFICATE-----" & vbCrLf & _ + "MIIE6DCCAtCgAwIBAgIQOQaY6KUdPItB52hpOsIBvjANBgkqhkiG9w0BAQsFADAw" & vbCrLf & _ + "MS4wLAYDVQQDEyVBREZTIFNpZ25pbmcgLSBzc28uc2F0aXRtLmNodWxhLmFjLnRo" & vbCrLf & _ + "MB4XDTI1MDQwNjEyNTQxNFoXDTI2MDQwNjEyNTQxNFowMDEuMCwGA1UEAxMlQURG" & vbCrLf & _ + "UyBTaWduaW5nIC0gc3NvLnNhdGl0bS5jaHVsYS5hYy50aDCCAiIwDQYJKoZIhvcN" & vbCrLf & _ + "AQEBBQADggIPADCCAgoCggIBAMlu6kjF9Ghsr9Z6+AIYRjHTx4OL6fROrCzq26/h" & vbCrLf & _ + "YBfsrsL5QeJlWtYhRsbrW3wAFaQukNYal5LRJx8BXXlngIDIfoIEixT62BqFC2XO" & vbCrLf & _ + "Ju7Rq+p1ei2WZb06V0It8ohmZVPqsDPzygjBblta27DBGQ8qQ4upGVTwOIBRisMj" & vbCrLf & _ + "Ixxx90p6DeB2ZCiGOYCYMYPdFWwz8QCZv64WbWRw3WhRKla05nyiV352aaC53XL0" & vbCrLf & _ + "ZZlRFV8jj6YiKsbKEzkxKpDVxEaH28NGVptBJyfkU5VOpqkmZZtqhSCrrIprfa+j" & vbCrLf & _ + "Dl6De9Siq8/CUDoZhkhRoNUqmhaiu0ZbV3AF0iN+XLtmeP/GJREz5m3gOoAGH8Rl" & vbCrLf & _ + "g5pyca6vmSnJHKnTsu8Elc4pVvO6jH1hqdBLVFa4uftqqBY2B/ZuUXj7764eHsMZ" & vbCrLf & _ + "kHZC6SXOxAP2BPbRbslbd4CRErnuE5rgMRQAYQVWcrDvagUdvm2T1+wJN7GmwBg9" & vbCrLf & _ + "GGhTA3r9howvIj2RFLxCZbpy2QlWKMb1zjyvtCHrM7g8/aGuvJfY5cmfww5aib4a" & vbCrLf & _ + "QpJq+ZyCPZpW8iXZTnxVuyV57WFTOmCvy/9dfK/IQXEqG5FIikwaB2nyL/D5FXIP" & vbCrLf & _ + "xH+OzLeLdLlKe2zpOJgx2p1M6rJ29AJRASKs+ikqlSV/i5t+1sw2qinFKJ8ZegsN" & vbCrLf & _ + "HDgBAgMBAAEwDQYJKoZIhvcNAQELBQADggIBABzrTEbbzMHbq0mIV1w3TL6IVOv8" & vbCrLf & _ + "BeXoYznSI7P/MhJwBXMbrYNNbpSkv5jWhtSAWQWrDrN0IUqvKwIYYRlRtgvma6Mk" & vbCrLf & _ + "PFXRvzkVhpuqm/bp1HAH2yoJUXNuWInzdJeMnPaQymU/hSvSJ8f66pwlPrAYTSBk" & vbCrLf & _ + "YIbcEdLJ3OmcnjOjj4W+s70J0s0HTnNQboAzjue3SmpsPVVetP+cwaoIASz2M6Fr" & vbCrLf & _ + "wfqFaUUiSAxcUzfELOyN8d1dnRFQVkrNyayz0fHH2Kje5GnGLMNaZTKZ88nVbmoq" & vbCrLf & _ + "Cbow7ofjEb74jNwWhmRhntuEE0I1W55LnU3Srjptjnfkd604W60DbqiWBKM6rTTb" & vbCrLf & _ + "ilCJsW3umI26/eFZAfZIA2n7/FKDcDXFCJOM1UV+09pZ12p0TAaA3nyA2TbdI+PM" & vbCrLf & _ + "GtvvEK2PU+tdU64uAlOOaldk52dIuR7kOVBk53Gf3K2wY2U/oovLrlXLHb8NJD49" & vbCrLf & _ + "Po6XT3w6WL+okyr7FgdmAHTNpTnthXG0pyN4KUFEAK9HWXdGRWUgFX4yBOjmPN1N" & vbCrLf & _ + "Vx7G3klMd+ccQUU80lxDKQUbjhcWLloWNlg6w2SKk4Ku7/f8HmPkqppvFow+ytWm" & vbCrLf & _ + "0abcCjptoUrFR1BCM86CIDCo9bEWIyWv+SHr2AvlQ8D0Z8aQRr6M73NN1PNWruPf" & vbCrLf & _ + "bpD2ekhB2vZ9R2ij" & vbCrLf & _ + "-----END CERTIFICATE-----" + + Try + Dim resp = New SamlHelper.Response(cert, samlResponse) + If resp.IsValid() Then + Dim email = resp.GetEmail() + Dim firstName = resp.GetFirstName() + Dim lastName = resp.GetLastName() + result.InnerHtml = $"

Welcome, {firstName} {lastName}

Email: {email}

" + Else + result.InnerHtml = "

Invalid SAML Response

" + End If + Catch ex As Exception + result.InnerHtml = $"

Error parsing response: {ex.Message}

" + End Try + End Sub + End Class +End Namespace diff --git a/App_Code/SAMLHelper.vb b/App_Code/SAMLHelper.vb new file mode 100644 index 0000000..9379cd3 --- /dev/null +++ b/App_Code/SAMLHelper.vb @@ -0,0 +1,83 @@ +Imports System.IO +Imports System.Text +Imports System.Xml +Imports System.Security.Cryptography +Imports System.Security.Cryptography.X509Certificates +Imports System.Security.Cryptography.Xml +Imports System.IO.Compression + +Namespace SAML + Public Class SamlHelper + + Public Shared Function CreateAuthRequest(issuer As String, assertionConsumerServiceUrl As String) As String + Dim id = "_" & Guid.NewGuid().ToString() + Dim issueInstant = DateTime.UtcNow.ToString("yyyy-MM-ddTHH:mm:ssZ") + + Dim requestXml As String = String.Format( _ + "" & vbCrLf & _ + " {3}" & vbCrLf & _ + "", _ + id, issueInstant, assertionConsumerServiceUrl, issuer _ + ) + + Dim bytes = Encoding.UTF8.GetBytes(requestXml) + + Using ms = New MemoryStream() + Using zip = New DeflateStream(ms, CompressionMode.Compress, True) + zip.Write(bytes, 0, bytes.Length) + End Using + Dim compressedBytes = ms.ToArray() + Return Convert.ToBase64String(compressedBytes) + End Using + End Function + + Public Class Response + Private ReadOnly _xml As XmlDocument + Private ReadOnly _certificate As X509Certificate2 + + Public Sub New(certString As String, base64Response As String) + Dim decoded = Convert.FromBase64String(base64Response) + Dim xmlString = Encoding.UTF8.GetString(decoded) + + _xml = New XmlDocument() + _xml.PreserveWhitespace = True + _xml.LoadXml(xmlString) + + _certificate = New X509Certificate2(Encoding.UTF8.GetBytes(certString)) + End Sub + + Public Function IsValid() As Boolean + Dim ns = New XmlNamespaceManager(_xml.NameTable) + ns.AddNamespace("ds", "http://www.w3.org/2000/09/xmldsig#") + + Dim signatureNode = _xml.SelectSingleNode("//ds:Signature", ns) + If signatureNode Is Nothing Then Return False + + Dim signedXml = New SignedXml(_xml) + signedXml.LoadXml(CType(signatureNode, XmlElement)) + + Return signedXml.CheckSignature(_certificate, True) + End Function + + Public Function GetEmail() As String + Return GetAttributeValue("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress") + End Function + + Public Function GetFirstName() As String + Return GetAttributeValue("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname") + End Function + + Public Function GetLastName() As String + Return GetAttributeValue("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname") + End Function + + Private Function GetAttributeValue(attributeName As String) As String + Dim nsmgr = New XmlNamespaceManager(_xml.NameTable) + nsmgr.AddNamespace("saml", "urn:oasis:names:tc:SAML:2.0:assertion") + + Dim attrNode = _xml.SelectSingleNode(String.Format("//saml:Attribute[@Name='{0}']/saml:AttributeValue", attributeName), nsmgr) + Return If(attrNode IsNot Nothing, attrNode.InnerText, String.Empty) + End Function + End Class + End Class +End Namespace diff --git a/Bin/Microsoft.IdentityModel.Logging.dll b/Bin/Microsoft.IdentityModel.Logging.dll new file mode 100644 index 0000000..60c2569 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Logging.dll differ diff --git a/Bin/Microsoft.IdentityModel.Logging.dll.refresh b/Bin/Microsoft.IdentityModel.Logging.dll.refresh new file mode 100644 index 0000000..1e2165e Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Logging.dll.refresh differ diff --git a/Bin/Microsoft.IdentityModel.Logging.pdb b/Bin/Microsoft.IdentityModel.Logging.pdb new file mode 100644 index 0000000..16146ce Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Logging.pdb differ diff --git a/Bin/Microsoft.IdentityModel.Logging.xml b/Bin/Microsoft.IdentityModel.Logging.xml new file mode 100644 index 0000000..2b45edd --- /dev/null +++ b/Bin/Microsoft.IdentityModel.Logging.xml @@ -0,0 +1,398 @@ + + + + Microsoft.IdentityModel.Logging + + + + + Event source based logger to log different events. + + + + + Static logger that is exposed externally. An external application or framework can hook up a listener to this event source to log data in a custom way. + + + + + Flag which indicates whether or not PII is shown in logs. False by default. + + + + + String that is used in place of any arguments to log messages if the 'ShowPII' flag is set to false. + + + + + Indicates whether or the log message header (contains library version, date/time, and PII debugging information) has been written. + + + + + The log message that indicates the current library version. + + + + + The log message that indicates the date. + + + + + The log message that is shown when PII is off. + + + + + The log message that is shown when PII is off. + + + + + Writes an event log by using the provided string argument and current UTC time. + No level filtering is done on the event. + + The log message. + No level filtering. + + + + Writes an event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a verbose event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a verbose event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an information event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an information event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a warning event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a warning event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an error event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an error event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a critical event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a critical event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument and current UTC time. + + + + The log message. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument, arguments list and current UTC time. + + + + The log message. + An object array that contains zero or more objects to format. + + + + Minimum log level to log events. Default is Warning. + + + + + Helper class for logging. + + + + + Logs an exception using the event source logger and returns new exception. + + argument that is null or empty. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger. + + The exception to log. + + + + Logs an exception using the event source logger. + + Identifies the level of an event to be logged. + The exception to log. + + + + Logs an information event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a verbose event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a warning event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Formats the string using InvariantCulture + + Format string. + Format arguments. + Formatted string. + + + + Log messages and codes for Microsoft.IdentityModel.Logging + + + + + Event listener that writes logs to a file or a fileStream provided by user. + + + + + Name of the default log file, excluding its path. + + + + + Initializes a new instance of that writes logs to text file. + + + + + Initializes a new instance of that writes logs to text file. + + location of the file where log messages will be written. + + + + Initializes a new instance of that writes logs to text file. + + StreamWriter where logs will be written. + + + + Called whenever an event has been written by an event source for which the event listener has enabled events. + + + + + + Releases all resources used by the current instance of the class. + + + + diff --git a/Bin/Microsoft.IdentityModel.Protocols.dll b/Bin/Microsoft.IdentityModel.Protocols.dll new file mode 100644 index 0000000..e31ce18 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Protocols.dll differ diff --git a/Bin/Microsoft.IdentityModel.Protocols.dll.refresh b/Bin/Microsoft.IdentityModel.Protocols.dll.refresh new file mode 100644 index 0000000..8c7f199 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Protocols.dll.refresh differ diff --git a/Bin/Microsoft.IdentityModel.Protocols.pdb b/Bin/Microsoft.IdentityModel.Protocols.pdb new file mode 100644 index 0000000..c6965d7 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Protocols.pdb differ diff --git a/Bin/Microsoft.IdentityModel.Protocols.xml b/Bin/Microsoft.IdentityModel.Protocols.xml new file mode 100644 index 0000000..babe3ca --- /dev/null +++ b/Bin/Microsoft.IdentityModel.Protocols.xml @@ -0,0 +1,310 @@ + + + + Microsoft.IdentityModel.Protocols + + + + + base class for authentication protocol messages. + + + + + Initializes a default instance of the class. + + + + + Builds a form post using the current IssuerAddress and the parameters that have been set. + + html with head set to 'Title', body containing a hiden from with action = IssuerAddress. + + + + Builds a Url using the current IssuerAddress and the parameters that have been set. + + UrlEncoded string. + Each parameter <Key, Value> is first transformed using . + + + + Returns a parameter. + + The parameter name. + The value of the parameter or null if the parameter does not exists. + If parameter is null + + + + Gets or sets the issuer address. + + If the 'value' is null. + + + + Gets the message parameters as a Dictionary. + + + + + Gets or sets the title used when constructing the post string. + + If the 'value' is null. + + + + Removes a parameter. + + The parameter name. + If 'parameter' is null or empty. + + + + Sets a parameter to the Parameters Dictionary. + + The parameter name. + The value to be assigned to parameter. + If 'parameterName' is null or empty. + If null is passed as value and the parameter exists, that parameter is removed. + + + + Sets a collection parameters. + + + + + + Gets or sets the script button text used when constructing the post string. + + If the 'value' is null. + + + + Gets or sets the text used when constructing the post string that will be displayed to used if script is disabled. + + If the 'value' is null. + + + + Manages the retrieval of Configuration data. + + The type of . + + + + 1 day is the default time interval that afterwards, will obtain new configuration. + + + + + 30 seconds is the default time interval that must pass for to obtain a new configuration. + + + + + 5 minutes is the minimum value for automatic refresh. can not be set less than this value. + + + + + 1 second is the minimum time interval that must pass for to obtain new configuration. + + + + + Static initializer for a new object. Static initializers run before the first instance of the type is created. + + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The client to use when obtaining configuration. + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The that reaches out to obtain the configuration. + If 'metadataAddress' is null or empty. + If 'configRetriever' is null. + If 'docRetriever' is null. + + + + Gets or sets the that controls how often an automatic metadata refresh should occur. + + + + + The minimum time between retrievals, in the event that a retrieval failed, or that a refresh was explicitly requested. + + + + + Obtains an updated version of Configuration. + + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Obtains an updated version of Configuration. + + CancellationToken + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Requests that then next call to obtain new configuration. + If the last refresh was greater than then the next call to will retrieve new configuration. + If == then this method does nothing. + + + + + Reads a local file from the disk. + + + + + Initializes a new instance of the class. + + + + + Reads a document using . + + Fully qualified path to a file. + not used. + UTF8 decoding of bytes in the file. + If address is null or whitespace. + with inner expection containing the original exception. + + + + Retrieves metadata information using HttpClient. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified httpClient. + + + 'httpClient' is null. + + + + Requires Https secure channel for sending requests.. This is turned ON by default for security reasons. It is RECOMMENDED that you do not allow retrieval from http addresses by default. + + + + + Returns a task which contains a string converted from remote document when completed, by using the provided address. + + Location of document + A cancellation token that can be used by other objects or threads to receive notice of cancellation. + Document as a string + + + + Interface that defines a model for retrieving configuration data. + + The type of . + + + + Retrieve the current configuration, refreshing and/or caching as needed. + This method will throw if the configuration cannot be retrieved, instead of returning null. + + + + + + + Indicate that the configuration may be stale (as indicated by failing to process incoming tokens). + + + + + Interface that defines methods to retrieve configuration. + + The type of the configuration metadata. + + + + Retrieves a populated configuration given an address and an . + + Address of the discovery document. + The to use to read the discovery document. + A cancellation token that can be used by other objects or threads to receive notice of cancellation. . + + + + Interface that defines a document retriever that returns the document as a string. + + + + + Obtains a document from an address. + + location of document. + . + document as a string. + + + + This type is for users that want a fixed and static Configuration. + In this case, the configuration is obtained and passed to the constructor. + + must be a class. + + + + Initializes an new instance of with a Configuration instance. + + Configuration of type OpenIdConnectConfiguration or OpenIdConnectConfiguration. + + + + Obtains an updated version of Configuration. + + . + Configuration of type T. + + + + For the this type, this is a no-op + + + + + Log messages and codes + + + + + Represents X509Certificate validation mode. + + + + diff --git a/Bin/Microsoft.IdentityModel.Tokens.Saml.dll b/Bin/Microsoft.IdentityModel.Tokens.Saml.dll new file mode 100644 index 0000000..97777f0 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.Saml.dll differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.Saml.dll.refresh b/Bin/Microsoft.IdentityModel.Tokens.Saml.dll.refresh new file mode 100644 index 0000000..1b3bef0 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.Saml.dll.refresh differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.Saml.pdb b/Bin/Microsoft.IdentityModel.Tokens.Saml.pdb new file mode 100644 index 0000000..1dade5d Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.Saml.pdb differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.Saml.xml b/Bin/Microsoft.IdentityModel.Tokens.Saml.xml new file mode 100644 index 0000000..c36162a --- /dev/null +++ b/Bin/Microsoft.IdentityModel.Tokens.Saml.xml @@ -0,0 +1,3539 @@ + + + + Microsoft.IdentityModel.Tokens.Saml + + + + + A collection of absolute URIs. + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when writing fails for a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes for Saml2Processing + + + + + Represents the Action element specified in [Saml2Core, 2.7.4.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Constructs an instance of Saml2Action class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is null. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml2Core, 2.7.4.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml2Core, 2.7.4.2] + + if 'value' is null or empty. + + + + Represents the Advice element specified in [Saml2Core, 2.6.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. [Saml2Core, 2.6.1] + + + + + Creates an instance of Saml2Advice. + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Represents the Assertion element specified in [Saml2Core, 2.3.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of a Saml2Assertion. + + Issuer of the assertion. + + + + Gets or sets the on the Assertion. + + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. [Saml2Core, 2.3.3] + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. [Saml2Core 2.3.3] + + + + + Gets or sets the identifier for this assertion. [Saml2Core, 2.3.3] + + if 'value' if null. + + + + Gets or sets the time instant of issue in UTC. [Saml2Core, 2.3.3] + + + + + Gets or sets the as the authority that is making the claim(s) in the assertion. [Saml2Core, 2.3.3] + + if 'value' is null. + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets or sets the of the statement(s) in the assertion. [Saml2Core, 2.3.3] + + + + + Gets the (s) regarding the subject. + + + + + Gets the version of this assertion. [Saml2Core, 2.3.3] + + + + + Represents the Attribute element specified in [Saml2Core, 2.7.3.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The value of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The collection of values that define the attribute. + if is Null or Empty. + + + + Gets or sets a string that provides a more human-readable form of the attribute's + name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the name of the attribute. [Saml2Core, 2.7.3.1] + + + + + Gets or sets a URI reference representing the classification of the attribute + name for the purposes of interpreting the name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the string that represents the OriginalIssuer of the this SAML Attribute. + + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets the values of the attribute. + + + + + Comparison class supporting multi-part keys for a dictionary + + + + + Represents the AttributeStatement element specified in [Saml2Core, 2.7.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AttributeStatement. + + + + + Creates an instance of Saml2AttributeStatement. + + The contained in this statement. + if is null. + + + + Creates an instance of Saml2AttributeStatement. + + The collection of elements contained in this statement. + if is null. + + + + Gets the collection of of this statement. [Saml2Core, 2.7.3] + + + + + Represents the AudienceRestriction element specified in [Saml2Core, 2.5.1.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AudienceRestriction. + + The audience element contained in this restriction. + if is null or empty. + + + + Creates an instance of Saml2AudienceRestriction. + + The collection of audience elements contained in this restriction. + if is null. + + + + Gets the audiences for which the assertion is addressed. + + + + + Represents the AuthnContext element specified in [Saml2Core, 2.7.2.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + This base class does not directly support any by-value authentication + context declarations (represented in XML by the AuthnContextDecl element). + To support by-value declarations, extend this class to support the data + model and extend Saml2AssertionSerializer, overriding ReadAuthnContext + and WriteAuthnContext to read and write the by-value declaration. + + + + + + Creates an instance of Saml2AuthenticationContext. + + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + The declaration reference of the authentication context. + + + + Gets Zero or more unique identifiers of authentication authorities that + were involved in the authentication of the principal (not including + the assertion issuer, who is presumed to have been involved without + being explicitly named here). [Saml2Core, 2.7.2.2] + + + + + Gets or sets a URI reference identifying an authentication context class that + describes the authentication context declaration that follows. + [Saml2Core, 2.7.2.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets a URI reference that identifies an authentication context + declaration. [Saml2Core, 2.7.2.2] + + if 'value' is not null and is not an absolute Uri. + + + + Represents the AuthnStatement element specified in [Saml2Core, 2.7.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates a Saml2AuthenticationStatement. + + The authentication context of this statement. + + + + Creates an instance of Saml2AuthenticationContext. + + The authentication context of this statement. + The time of the authentication. + if is null. + + + + Gets or sets the used by the authenticating authority up to and including + the authentication event that yielded this statement. [Saml2Core, 2.7.2] + + + + + Gets or sets the time at which the authentication took place. [Saml2Core, 2.7.2] + + if 'value' is null. + + + + Gets or sets the index of a particular session between the principal + identified by the subject and the authenticating authority. [Saml2Core, 2.7.2] + + + + + Gets or sets the time instant at which the session between the principal + identified by the subject and the SAML authority issuing this statement + must be considered ended. [Saml2Core, 2.7.2] + + + + + Gets or sets the which contains the DNS domain name and IP address for the system from which + the assertion subject was authenticated. [Saml2Core, 2.7.2] + + + + + Represents the AuthzDecisionStatement specified in [Saml2Core, 2.7.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + The empty URI reference, which may be used with the meaning + "the start of the current document" for the Resource property. + + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + if is null. + if is not an absolute Uri. + if is null or empty. + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + Collection of specifications. + + + + Gets of set the set of authorized to be performed on the specified + resource. [Saml2Core, 2.7.4] + + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. [Saml2Core, 2.7.4] + + + + + Gets or sets a set of that the SAML authority relied on in making + the decision. [Saml2Core, 2.7.4] + + + + + Gets or sets a URI reference identifying the resource to which access + authorization is sought. [Saml2Core, 2.7.4] + + + In addition to any absolute URI, the Resource may also be the + empty URI reference, and the meaning is defined to be "the start + of the current document". [Saml2Core, 2.7.4] + + + + + Represents the Conditions element specified in [Saml2Core, 2.5.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of . class. + + + + + Initializes a new instance of . class. + + if is null. + + + + Gets a collection of that the assertion is addressed to. + [Saml2Core, 2.5.1] + + + + + Gets or sets the earliest time instant at which the assertion is valid. + [Saml2Core, 2.5.1] + + if 'value' is greater or equal to . + + + + Gets or sets the time instant at which the assertion has expired. + [Saml2Core, 2.5.1] + + if 'value' is less than or equal to . + + + + Gets or sets a value indicating whether the assertion SHOULD be used immediately and MUST NOT + be retained for future use. [Saml2Core, 2.5.1] + + + + + Gets or sets the that specified limitations that the asserting party imposes on relying parties + that wish to subsequently act as asserting parties themselves and issue assertions of their own on the basis of the information contained in + the original assertion. [Saml2Core, 2.5.1] + + + + + Contains constants related to SAML2. + + + + + The subject of the assertion is the bearer of the assertion. [Saml2Prof, 3.3] + + + + + The holder of a specified key is considered to be the subject of the assertion + by the asserting party. [Saml2Prof, 3.1] + + + + + Indicates that no other information is available about the context of use of the + assertion. [Saml2Prof, 3.2] + + + + + These identifiers MAY be used in the Format attribute of the NameID, + NameIDPolicy, or Issuer elements to refer to common formats for the + content of the elements and the associated processing rules, if any. + [Saml2Core, 8.3] + + + + + The interpretation of the content of the element is left to + individual implementations. [Saml2Core, 8.3.1] + + + + + Indicates that the content of the element is in the form of an + email address, specifically "addr-spec" as defined in + [RFC 2822, 3.4.1]. [Saml2Core, 8.3.2] + + + + + Indicates that the content of the element is in the form specified + for the contents of the X509SubjectName element from [XMLSig]. + [Saml2Core, 8.3.3] + + + + + Indicates that the content of the element is a Windows domain + qualified name. [Saml2Core, 8.3.4] + + + + + Indicates that the content of the element is in the form of a + Kerberos principal name using the format name[/instance]@REALM. + [Saml2Core, 8.3.5] + + + + + Indicates that the content of the element is a URI identifying an + entity that provides SAML-based services (such as a SAML authority, + requester, or responder) or is a participant in SAML profiles (such + as a service provider supporting the browser SSO profile). + [Saml2Core, 8.3.6] + + + + + Indicates that the content of the element is a persistent opaque + identifier for a principal that is specific to an identity provider + and a service provider or affiliation of service providers. + [Saml2Core, 8.3.7] (See also for many restrictions on the data.) + + + + + Indicates that the content of the element is an identifier with + transient semantics and SHOULD be treated as an opaque and + temporary value by the relying party. [Saml2Core, 8.3.8] + + + + + When included in the Format attribute of the NameIDPolicy attribute, + requests that the resulting identifier be encrypted. [Saml2Core, 3.4.1.1] + + + + + Represents the Evidence element specified in [Saml2Core, 2.7.4.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + [Saml2Core, 2.7.4.3] + + + + + Initializes a new instance of class. + + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Represents the identifier used for SAML assertions. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + +
+ This identifier should be unique per [Saml2Core, 1.3.4] + and must fit the NCName xml schema definition, which is to say that + it must begin with a letter or underscore. +
+
+ + + Creates a new ID value based on a GUID. + + + + + Creates a new ID whose value is the given string. + + The Saml2 Id. + if is null or empty. + if is not a valid NCName. + + + + Gets the identifier string. + + + + + Represents the NameID element as specified in [Saml2Core, 2.2.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of from a name. + + Name string to initialize with. + + + + Initializes an instance of from a name and format. + + Name string to initialize with. + specifying the identifier format. + if is null of empty. + if is not an absolute Uri. + + + + Gets or sets the used for encrypting. + + + + + Gets or sets a URI reference representing the classification of string-based identifier + information. [Saml2Core, 2.2.2] + + if 'value' is not an absolute Uri. + + + + Gets or sets the security or administrative domain that qualifies the name. [Saml2Core, 2.2.2] + + + + + Gets or sets a name that further qualifies the name of a service provider or affiliation + of providers. [Saml2Core, 2.2.2] + + + + + Gets or sets a name identifier established by a service provider or affiliation of providers + for the entity, if different from the primary name identifier. [Saml2Core, 2.2.2] + + + + + Gets or sets the value of the name identifier. + + if 'value' is null or empty. + + + + Represents the ProxyRestriction element specified in [Saml2Core, 2.5.1.6]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of . + + + + + Gets the set of audiences to whom the asserting party permits + new assertions to be issued on the basis of this assertion. + + + + + Gets or sets the maximum number of indirections that the asserting party + permits to exist between this assertion and an assertion which has + ultimately been issued on the basis of it. + + if 'value' is less than 0. + + + + A security token backed by a SAML2 assertion. + + + + + Initializes an instance of from a . + + A to initialize from. + if is null. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml2 Tokens. See: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes a new instance of . + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Returns a value that indicates if this handler can validate a . + + 'true', indicating this instance can validate a . + + + + Gets the token type supported by this handler. + + + + + Gets the value that indicates if this instance can write a . + + 'true', indicating this instance can write a . + + + + Determines if the string is a valid Saml2 token by examining the xml for the correct start element. + + A Saml2 token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Creates a . + + The that has creation information. + A instance. + If is null. + + + + Creates a . + + The that has creation information. + additional information for creating a . + A instance. + If is null. + + + + Reads and validates a . + + The Saml2 token. + Contains validation parameters for the . + The that was validated. + is null or empty. + is null. + .Length is greater than . + if the is not well-formed. + A representing the identity contained in the token. + + + + Validates the first SubjectConfirmationData + + the Saml2 token that is being validated. + validation parameters. + If is null. + If .Assertion is null. + If is null. + If .Subject is null. + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates token for replay. + + expiration time. + the Saml2 token that is being validated. + validation parameters. + By default no action is takes, this requires users to set TokenCache or a Delegate. + + + + Validates object for lifetime. + + the being validated. + the that will be used during validation. + The to validate. + If is null. + If is null. + calls + + + + Validates that the signature. + + A Saml2 token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signature AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If .Assertion' is null. + If key fails to resolve, then null is returned. + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Reads and validates a SAML 2.0 token using the XmlReader. + + A reader positioned at a element. + validation parameters for the . + An instance of . + Currently not supported. + + + + Indicates if the current XML element is pointing to a Saml2Assertion. + + A reader that may contain a . + 'true' if reader contains a . 'false' otherwise. + + + + Creates the conditions for the assertion. + + + + Generally, conditions should be included in assertions to limit the + impact of misuse of the assertion. Specifying the NotBefore and + NotOnOrAfter conditions can limit the period of vulnerability in + the case of a compromised assertion. The AudienceRestrictionCondition + can be used to explicitly state the intended relying party or parties + of the assertion, which coupled with appropriate audience restriction + enforcement at relying parties can help to mitigate spoofing attacks + between relying parties. + + + The default implementation creates NotBefore and NotOnOrAfter conditions + based on the tokenDescriptor.Lifetime. It will also generate an + AudienceRestrictionCondition limiting consumption of the assertion to + tokenDescriptor.Scope.Address. + + + contains the details of the conditions. + A Saml2Conditions object. + If is null. + + + + Creates the advice for the assertion. + + + By default, this method returns null. + + The token descriptor. + A object, default is null. + + + + Creates a name identifier that identifies the assertion issuer. + + The token descriptor. + A using .Issuer. + If is null. + If .Issuer is null or empty. + Uses tokenDescriptor.Issuer. + + + + Creates a Saml2Attribute from a claim. + + The from which to generate a . + A created from the . + if is null. + if the has a property "ClaimsProperties.SamlAttributeNameFormat" and the value is not a valid absolute URI. + + + + Creates from a and a + + This method may return null if the token descriptor does not contain any subject or the subject does not have any claims. + + The that contains information on building the . + A Saml2AttributeStatement. + if is null. + + + + Consolidates attributes into a single attribute with multiple values. + + A of . + A of with common attributes consolidated into unique attributes with multiple values. + If is null. + + + + Transforms a ClaimsIdentity into a string. + + A to be transformed. + if is null. + A well-formed XML string. + Normally this is called when creating a from a . When is not null, + this method is called to create an string representation to add as an attribute. + The string is formed: "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor> + + + + Builds an XML formatted string from a collection of SAML attributes that represent the Actor. + + An enumeration of Saml2Attributes. + A well-formed XML string. + The string is of the form "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor>" + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + An enumeration of Saml2Statements. + if is null. + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + additional information used when creating a . + An enumeration of Saml2Statements. + if is null. + + + + Creates a Saml2AuthenticationStatement + + authenticationInformation object containing the state to be wrapped as a Saml2AuthenticationStatement object. + A + if is null, then null is returned. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates a SAML2 subject of the assertion. + + The security token descriptor to create the subject. + Thrown when 'tokenDescriptor' is null. + A . + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null. + If is null. + If .Assertion' is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + This method gets called when a special type of Saml2Attribute is detected. The Saml2Attribute passed in + wraps a Saml2Attribute that contains a collection of AttributeValues, each of which will get mapped to a + claim. All of the claims will be returned in an ClaimsIdentity with the specified issuer. + + The to use. + The that is the subject of this token. + The issuer of the claim. + Will be thrown if the Saml2Attribute does not contain any + valid Saml2AttributeValues. + + + + + Processes all statements and adds claims to the identity. + + A collection of Saml2Statement. + The . + The issuer. + + + + Adds claims from the into the . + + The . + The . + The issuer. + If is null. + If is null. + + + + Creates claims from a . + + The . + The identity that will contain a for each . + The issuer for each . + If is null. + If is null. + if multiple 'Actor' claims are found. + + + + Creates claims from a . + + The . + The identity that will contain the Authentication s. + The issuer for each . + If is null. + If is null. + If .DeclarationReference is not null. Override if this is required. + + + + Creates claims from a . + + The . + The identity that will contain the AuthorizationDecision s. + The issuer for each . + Provided for extensibility. By default no claims are added. + + + + Creates claims from a Saml2 token. + + The . + The value to set + creates the using . + A with claims from the saml statements. + If is null. + If .Assertion is null. + + + + Determines if the audience found in a is valid. + + The audiences found in the + The that is being validated. + required for validation. + for additional details. + + + + Determines if the issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Serializes a to a string. + + A . + If the is null. + If is not a . + + + + Writes a using the XmlWriter. + + A to serialize the . + The to serialize. + If is null. + If is null. + If is not a . + If is null. + + + + Reads and writes a or + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null or empty. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Reads the <saml:Action> element. + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Action. + If is positioned at an empty element. + If Saml2Action is missing @namespace. + If Saml2Action is not an Absolute Uri. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML2 namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Advice. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Reads a . + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + If is null. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads an attribute value. + + A positioned at a . + The . + The attribute value as a string. + The input parameter 'reader' is null. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnContext> element. + + + The default implementation does not handle the optional + <saml:AuthnContextDecl> element. To handle by-value + authentication context declarations, override this method. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnStatement> element or a <saml:Statement> + element that specifies an xsi:type of saml:AuthnStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Condition> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:EncryptedId> element. + + pointing at the XML EncryptedId element + An instance of representing the EncryptedId that was read + Not implemented right now. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Issuer> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:NameID> element. + + A positioned at a element. + An instance of + The input parameter 'reader' is null. + + + + Both <Issuer> and <NameID> are of NameIDType. This method reads + the content of either one of those elements. + + A positioned at a element. + An instance of + + + + Reads the <saml:ProxyRestriction> element, or a <saml:Condition> + element that specifies an xsi:type of saml:ProxyRestrictionType. + + + In the default implementation, the maximum value of the Count attribute + is limited to Int32.MaxValue. + + A positioned at a element. + An instance of + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Reads the <saml:Subject> element. + + A positioned at a element. + An instance of . + + The default implementation does not handle the optional + <EncryptedID> element. To handle encryped IDs in the Subject, + override this method. + + + + + Reads the <SubjectConfirmation> element. + + A positioned at a element. + An instance of . + + + + Reads the <saml:SubjectConfirmationData> element. + + A positioned at a element. + An instance of . + + The default implementation handles the unextended element + as well as the extended type saml:KeyInfoConfirmationDataType. + + + + + Deserializes the SAML SubjectId. + + XmlReader positioned at "NameID, EncryptedID, BaseID". + the element name of the parent element. Used in exception string. + if Element is 'BaseID' with no xsi type. + if reader is pointing at an unknown Element. + A instance. + + + + Reads the <saml:SubjectLocality> element. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .EncryptingCredentials != null. + The must have a if no are present. + The SAML2 authentication, attribute, and authorization decision require a . + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <saml:AuthnContext> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:AuthnStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null or empty. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes the <saml:Issuer> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:NameID> element. + + A to serialize the . + The to serialize. + if is null. + if null. + + + + Both <Issuer> and <NameID> are of NameIDType. Writes the content of either one of those elements. + + A to serialize the . + The to serialize. + If 'writer' is null. + If 'nameIdentifier' is null. + If 'nameIdentifier.Value' is null or empty. + + + + Writes the <saml:ProxyRestriction> element. + + A to serialize the . + The to serialize. + + + + Writes a Saml2Statement. + + + This method may write a <saml:AttributeStatement>, <saml:AuthnStatement> + or <saml:AuthzDecisionStatement> element. To handle custom Saml2Statement + classes for writing a <saml:Statement> element, override this method. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmation> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmationData> element. + + + When the data.KeyIdentifiers collection is not empty, an xsi:type + attribute will be written specifying saml:KeyInfoConfirmationDataType. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectLocality> element. + + A to serialize the . + The to serialize. + + + + Represents the StatementAbstractType specified in [Saml2Core, 2.7.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example Saml2Assertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Gets or sets the . [Saml2Core, 2.4.1] + + + + + Gets a collection of which can be used to validate and confirm the . [Saml2Core, 2.4.1] + + + If more than one subject confirmation is provied, then satisfying any one of + them is sufficient to confirm the subject for the purpose of applying the + assertion. + + + + + Represents the SubjectConfirmation element specified in [Saml2Core, 2.4.1.1]. + + + + + Initializes an instance of from a indicating the + method of confirmation. + + The to use for initialization. + + + + Initializes an instance of from a indicating the + method of confirmation and . + + The to use for initialization. + The to use for initialization. + + + + Gets or sets a URI reference that identifies a protocol or mechanism to be used to + confirm the subject. [Saml2Core, 2.4.1.1] + + + + + Gets or sets the expected to satisfy the enclosing subject + confirmation requirements. [Saml2Core, 2.4.1.1] + + + + + Gets or sets additional to be used by a specific confirmation + method. [Saml2Core, 2.4.1.1] + + + + + Represents the SubjectConfirmationData element and the associated + KeyInfoConfirmationDataType defined in [Saml2Core, 2.4.1.2-2.4.1.3]. + + + + + Initializes an instance of . + + + + + Gets or sets the network address/location from which an attesting entity can present the + assertion. [Saml2Core, 2.4.1.2] + + + + + Gets or sets the of a SAML protocol message in response to which an attesting entity can + present the assertion. [Saml2Core, 2.4.1.2] + + + + + Gets a collection of which can be used to authenticate an attesting entity. [Saml2Core, 2.4.1.3] + + + + + Gets or sets a time instant before which the subject cannot be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a time instant at which the subject can no longer be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a URI specifying the entity or location to which an attesting entity can present + the assertion. [Saml2Core, 2.4.1.2] + + + + + Represents the SubjectLocality element specified in [Saml2Core, 2.7.2.1]. + + + This element is entirely advisory, since both of these fields are quite + easily "spoofed". [Saml2Core, 2.7.2.1] + + + + + Initializes an instance of . + + + + + Initializes an instance of from an address and DNS name. + + A indicating the address. + A indicating the DNS name. + + + + Gets or sets the network address of the system from which the principal identified + by the subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + Gets or sets the DNS name of the system from which the principal identified by the + subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets the collection of authority bindings. + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes + + + + + Represents the Action element specified in [Saml, 2.4.5.1]. + see: https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf + + + + + Constructs an instance of class. + + Action value represented by this class. + if is null or empty. + + + + Constructs an instance of class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml, 2.4.5.1] + + if is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml, 2.4.5.1] + + if is null or empty. + + + + Represents the Advice element specified in [Saml, 2.3.2.2]. + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. + + + + + Creates an instance of . + + + + + Creates an instance of . + + . + + + + Creates an instance of . + + + + + + Creates an instance of . + + . + . + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representating the assertions in the . + + + + + Represents the Assertion element specified in [Saml, 2.3.2]. + + + + + Creates an instance of . + + AssertionID of the assertion. + Issuer of the assertion. + IssueInstant of the assertion. + SamlConditions of the assertion. + SamlAdvice of the assertion. + . + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. + + + + + Gets or sets the identifier for this assertion. + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the issuer in the assertion. + + + + + Gets or sets the time instant of issue in UTC. + + + + + Gets the major version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets the minor version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets or sets the on the Assertion. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets the (s) regarding the subject. + + + + + Represents the Attribute element. + + + + + Initializes a new instance of . + + + + + Initializes a new instance of s. + + The namespace of the attribute. + The name of the attribute. + The value of the attribute. + + + + Initializes a new instance of . + + The namespace of the attribute. + The name of the attribute. + . + if is null. + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets or sets the ClaimType of the attribute. + + + + + Gets or sets the name of the attribute. + + if 'value' is null or empty. + + + + Gets or sets the namespace of the attribute. + + + + + Gets or sets the string that represents the OriginalIssuer of the SAML Attribute. + + + + + Gets a collection of representing attributes. + + + + + Comparison class supporting multi-part keys for a dicitionary + + + + + A class contains Saml attribute key. + + + + + Represents the Saml Attribute Key. + + + + + + Override GetHashCode function. + + + + + + Compare AttributeKeys. + + + + + + + + Get the AttributeKey's hash code. + + + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The subject of the attribute statement. + The contained in this statement. + + + + Creates an instance of . + + The subject of the attribute statement. + . + + + + Gets a collection of . + + + + + Represents the AudienceRestrictionCondition. + + + + + Creates an instance of . + + The audience element contained in this restriction. + + + + Creates an instance of . + + An containing the audiences for a . + + + + Gets the of audiences for a . + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The Subject of the Statement. + The URI reference that specifies the type of authentication that took place. + The time at which the authentication took place. + The DNS domain name for the system entity from which the subject was apparently authenticated. + The IP address for the system entity from which the subject was apparently authenticated. + . + + + + Gets or sets the instant of authentication. + + + + + Gets or sets the method of authentication. + + if 'value' is null or empty. + + + + Gets the collection of . + + + + + Gets or sets Domain Name Service address. + + + + + Gets or sets Internet Protocol address. + + + + + Represents the SamlAuthorityBinding specified in [Saml, 2.4.3.2]. + + + + + Create an instance of . + + The type of SAML protocol queries to which the authority described by this element will respond. + The URI identifying the SAML protocol binding to use in communicating with the authority. + The URI describing how to locate and communicate with the authority. + + + + Gets or sets the AuthorityKind of the binding. + + + + + Gets or sets the binding. + + + + + Gets or sets the location of the binding. + + + + + Represents the AuthorizationDecisionStatement specified in [Saml, 2.4.5]. + + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + Collection of specifications. + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. + + + + + Gets a collection of representing the action values contained in the AuthorizationDecisionStatement. + + + + + Gets the ClaimType. + + + + + Gets or sets the evidence contained in the AuthorizationDecisionStatement. + + + + + Gets or sets the resource contained in the AuthorizationDecisionStatement. + + + + + Saml Condition element. + + + + + Represents the Conditions element specified in [Saml, 2.3.2.1]. + + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + . + + + + Gets a collection of that the assertion is addressed to. + + + + + Gets or sets the earliest time instant at which the assertion is valid. + + + + + Gets or sets the time instant at which the assertion has expired. + + + + + Contains constants related to SAML. + + + + + Known values for + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the Evidence element specified in [Saml, 2.4.5.2]. + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + . + + + + Gets a collection of . + + + + + Gets a collection of for use by the . + + + + + A security token backed by a SAML assertion. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + A to initialize from. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml Tokens, + which supports validating tokens passed as strings using . + + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes an instance of . + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'true' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize securityToken handled + by this instance. + + true if the WriteToken method can serialize this securityToken. + + + + Gets or sets the SamlSubject comparer. + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Gets the securityToken type supported by this handler. + + + + + Adds all Actors. + + . + Attribute collection to which the Actor added. + if is null. + + + + Determines if the string is a valid Saml token by examining the xml for the correct start element. + + A Saml token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Collects attributes with a common claim type, claim value type, and original issuer into a single attribute with multiple values. + + to consolidate. + common attributes collected into value lists. + + + + Override this method to provide a SamlAdvice to place in the Samltoken. + + Contains information about the token. + SamlAdvice, default is null. + + + + Generates a SamlAttribute from a claim. + + Claim from which to generate a SamlAttribute. + + if the is null. + if the type of doesn't have "/" or only has "/" at the beginning or doesn't have any character(s) after the last "/". + + + + Creates SamlAttributeStatements and adds them to a collection. + Override this method to provide a custom implementation. + + Default behavior is to create a new SamlAttributeStatement for each Subject in the tokenDescriptor.Subjects collection. + + + The SamlSubject to use in the SamlAttributeStatement that are created. + Contains all the other information that is used in token issuance. + SamlAttributeStatement + if is null. + if is null. + + + + Creates a SamlAuthenticationStatement for each AuthenticationInformation found in AuthenticationInformation. + Override this method to provide a custom implementation. + + The SamlSubject of the Statement. + Contains all the other information that is used in token issuance. + SamlAuthenticationStatement + if is null. + if Assertion has one or more AuthenticationStatement, and one of AuthenticationMethod and authenticationInstant is null. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates claims from a Saml securityToken. + + A that will be used to create the claims. + The value to set + Contains parameters for validating the securityToken. + A containing the claims from the . + if is null. + if is null. + + + + Generates all the conditions for saml + + information that is used in token issuance. + SamlConditions + if is null. + + + + Generates an enumeration of SamlStatements from a SecurityTokenDescriptor. + Only SamlAttributeStatements and SamlAuthenticationStatements are generated. + Overwrite this method to customize the creation of statements. + + Calls in order (all are virtual): + 1. CreateSamlSubject + 2. CreateAttributeStatements + 3. CreateAuthenticationStatements + 4. CreateAuthorizationDecisionStatement + + + The SecurityTokenDescriptor to use to build the statements. + additional information for creating a . + An enumeration of SamlStatement. + if is null. + + + + Returns the SamlSubject to use for all the statements that will be created. + Overwrite this method to customize the creation of the SamlSubject. + + Contains all the information that is used in token issuance. + A SamlSubject created from the first subject found in the tokenDescriptor as follows: + + 1. Claim of Type NameIdentifier is searched. If found, SamlSubject.Name is set to claim.Value. + 2. If a non-null tokenDescriptor.proof is found then SamlSubject.KeyIdentifier = tokenDescriptor.Proof.KeyIdentifier AND SamlSubject.ConfirmationMethod is set to 'HolderOfKey'. + 3. If a null tokenDescriptor.proof is found then SamlSubject.ConfirmationMethod is set to 'BearerKey'. + + + if is null. + if the tokenDescriptor has more than one name identifier claim. + + + + Creates a based on a information contained in the . + + The that has creation information. + A instance. + If is null. + + + + Creates a based on a information contained in the . + + The that has creation information. + additional information for creating the . + A instance. + If is null. + + + + Builds an XML formated string from a collection of saml attributes that represent an Actor. + + . + A well formed XML string. + The string is of the form "<Actor><SamlAttribute name, ns><SamlAttributeValue>...</SamlAttributeValue>, ...</SamlAttribute>...</Actor>" + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + if Actor existing in both identity and attributes of statement. + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + + + + Creates claims from a . + + The . + A . + The issuer. + Provided for extensibility. By default no claims are created. + + + + Creates claims from a unknow statements. + + The . + A + The issuer. + + + + Processes all statements to generate claims. + + A that will be used to create the claims. + The issuer. + Contains parameters for validating the securityToken. + A containing the claims from the . + if the statement is not a . + + + + Creates subject claims from the . + + The . + The subject. + The issuer. + if is null. + if is null. + if the doesn't have the name or confirmation methonds. + + + + Converts a string into an instance of . + + a Saml token as a string. + A + if is null or empty. + If 'token.Length' $gt; . + + + + Converts a string into an instance of . + + a Saml token as a string. + A + If is null or empty. + If 'token.Length' $gt; . + + + + Deserializes from XML a token of the type handled by this instance. + + An XML reader positioned at the token's start + element. + validation parameters for the . + An instance of . + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If is null. + If key fails to resolve, then null is returned + + + + This method gets called when a special type of SamlAttribute is detected. The SamlAttribute passed in wraps a SamlAttribute + that contains a collection of AttributeValues, each of which are mapped to a claim. All of the claims will be returned + in an ClaimsIdentity with the specified issuer. + + The SamlAttribute to be processed. + The identity that should be modified to reflect the SamlAttribute. + Issuer Identity. + if we have two delegates acting as an identity, we do not allow this. + + + + Determines if the audiences found in a are valid. + + . + The being validated. + required for validation. + see for additional details. + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null or empty. + If is null. + If is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Validates the was signed by a valid . + + The that signed the . + The being validated. + The current . + + + + Validates the lifetime of a . + + The value found in the . + The value found in the . + The being validated. + required for validation. + for additional details. + + + + Validates that the signature, if found is valid. + + A Saml token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the 'token' has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signture AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates the token replay. + + expiration time of the + to validate + that will be used during validation + + + + Reads and validates a well formed . + + A string containing a well formed securityToken. + Contains data and information needed for validation. + The that was validated. + A generated from the claims in the Saml securityToken. + if is null or whitespace. + if is null. + if 'securityToken.Length' $gt; . + + + + Serializes a to a string. + + A . + if the is null. + if the token is not a . + + + + Serializes to XML a securityToken of the type handled by this instance. + + The XML writer. + A securityToken of type . + if the is null. + if the is null. + if the token is not a . + if is null. + + + + Reads and writes SamlAssertions + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Read the <saml:Action> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Attribute> element. + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + + + + + Read the saml:AuthenticationStatement. + + XmlReader positioned at a saml:AuthenticationStatement. + SamlAuthenticationStatement + The input parameter 'reader' is null. + or the statement contains a unknown child element. + + + + Reads a <saml:Binding> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Condition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Conditions> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:DoNotCacheCondition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Read the SamlSubject from the XmlReader. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null or empty. + if is not well formed. See . + if is null or empty. + if .Count == 0. + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if any attribute values are null or empty. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <AuthenticationStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <AuthorityBinding> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null. + if is null or empty. + if is null or empty. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null. + + + + Writes the <saml:Condition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + Writes a or a all others are skipped. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:DoNotCacheCondition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes one of the suppported Statements. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Represents the StatementAbstractType specified in [Saml, 2.4]. + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example SamlAssertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.2.1]. + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + . + The confirmation data contained in the subject. + + + + Gets or sets confirmation data. + + + + + Gets confirmation methods. + + + + + Gets or sets the . + + + + + Gets or sets the. + + + + + Gets or sets the name of the Subject. + + + + + Gets the ClaimType. + + + + + Gets or sets the format of the Subject. + + + + + Gets or sets the name qualifier of the Subject. + + + + + Represents the SubjectStatement element. + + + + + Gets or sets the subject of the statement. + + +
+
diff --git a/Bin/Microsoft.IdentityModel.Tokens.dll b/Bin/Microsoft.IdentityModel.Tokens.dll new file mode 100644 index 0000000..4d3eb7c Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.dll differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.dll.refresh b/Bin/Microsoft.IdentityModel.Tokens.dll.refresh new file mode 100644 index 0000000..9b9e9d2 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.dll.refresh differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.pdb b/Bin/Microsoft.IdentityModel.Tokens.pdb new file mode 100644 index 0000000..128b374 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Tokens.pdb differ diff --git a/Bin/Microsoft.IdentityModel.Tokens.xml b/Bin/Microsoft.IdentityModel.Tokens.xml new file mode 100644 index 0000000..cccf5bd --- /dev/null +++ b/Bin/Microsoft.IdentityModel.Tokens.xml @@ -0,0 +1,3018 @@ + + + + Microsoft.IdentityModel.Tokens + + + + + Base class for a Security Key that contains Asymmetric key material. + + + + + This must be overridden to get a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets the status of the private key. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Enum for the existence of private key + + + + + private key exists for sure + + + + + private key doesn't exist for sure + + + + + unable to determine the existence of private key + + + + + Provides signing and verifying operations when working with an + + + + + Mapping from algorithm to minimum .KeySize when creating signatures. + + + + + Mapping from algorithm to minimum .KeySize when verifying signatures. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + Whether this is required to create signatures then set this to true. + + Creating signatures requires that the has access to a private key. + Verifying signatures (the default), does not require access to the private key. + + 'key' is null. + + willCreateSignatures is true and .KeySize is less than the size corresponding to the given algorithm in . + + + .KeySize is less than the size corresponding to the algorithm in . Note: this is always checked. + + If and algorithm pair are not supported. + If the runtime is unable to create a suitable cryptographic provider. + + + + Gets the mapping from algorithm to the minimum .KeySize for creating signatures. + + + + + Gets the mapping from algorithm to the minimum .KeySize for verifying signatures. + + + + + Returns the algorithm name. + + The hash algorithm to use to create the hash value. + + + + Produces a signature over the 'input' using the and algorithm passed to . + + The bytes to be signed. + A signature over the input. + 'input' is null. + 'input.Length' == 0. + If has been called. + If the internal is null. This can occur if the constructor parameter 'willBeUsedforSigning' was not 'true'. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Validates that the asymmetric key size is more than the allowed minimum + + The asymmetric key to validate + Algorithm for which this key will be used + Whether they key will be used for creating signatures + + + + Verifies that a signature over the' input' matches the signature. + + The bytes to generate the signature over. + The value to verify against. + true if signature matches, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + If has been called. + If the internal is null. This can occur if a derived type does not call the base constructor. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Calls to release this managed resources. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Encodes and Decodes strings as Base64Url encoding. + + + + + The following functions perform base64url encoding which differs from regular base64 encoding as follows + * padding is skipped so the pad character '=' doesn't have to be percent encoded + * the 62nd and 63rd regular base64 encoding characters ('+' and '/') are replace with ('-' and '_') + The changes make the encoding alphabet file and URL safe. + + string to encode. + Base64Url encoding of the UTF8 bytes. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + An offset in inArray. + The number of elements of inArray to convert. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts the specified string, which encodes binary data as base-64-url digits, to an equivalent 8-bit unsigned integer array. + base64Url encoded string. + UTF8 bytes. + + + + Decodes the string from Base64UrlEncoded to UTF8. + + string to decode. + UTF8 string. + + + + Definition of cache for crypto providers + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + true if the was added, false if the cache already contained the + + + + Trys to find a in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + true if the was removed, false if the was not found. + + + + Creates cryptographic operators by specifying a 's and algorithms. + + + + + Returns the default instance. + + + + + Gets or sets the default value for caching + + + + + Static constructor that initializes the default . + + + + + Default constructor for . + + + + + Constructor that creates a deep copy of given object. + + to copy from. + + + + Gets the + + + + + Extensibility point for creating custom cryptographic operators. + + By default, if set, will be called before creating cryptographic operators. + If true is returned, then will be called. The will throw if the + Cryptographic operator returned is not of the correct type. + + + + Gets or sets a bool controlling if should be cached. + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + 'key' is not a . + 'algorithm, key' pair is not supported. + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates a that supports the and algorithm. + + The to use for signing. + The algorithm to use for signing. + 'key' is null. + 'algorithm' is null or empty. + ' is too small. + is too small. + is not a or a . + + AsymmetricSignatureProviders require access to a PrivateKey for Signing. + When finished with the call . + + + + + Returns a instance supports the and algorithm. + + The to use for signing. + The algorithm to use for verifying. + 'key' is null. + 'algorithm' is null or empty. + is too small. + is too small. + ' is not a or a . + When finished with the call . + + + + Returns a for a specific algorithm. + + the name of the hash algorithm to create. + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Returns a for a specific algorithm. + + the keyed hash algorithm to create. + bytes to use to create the Keyed Hash + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Answers if an algorithm is supported + + the name of the cryptographic algorithm + + + + + Checks if an 'algorithm, key' pair is supported. + + the algorithm to check. + the . + true if 'algorithm, key' pair is supported. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + Helper class for adding DateTimes and Timespans. + + + + + Add a DateTime and a TimeSpan. + The maximum time is DateTime.MaxTime. It is not an error if time + timespan > MaxTime. + Just return MaxTime. + + Initial value. + to add. + as the sum of time and timespan. + + + + Gets the Maximum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Gets the Minimum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Ensures that DataTime is UTC. + + to convert. + + + + + Ensures that DateTime is UTC. + + to convert. + + + + + Represents a ECDsa security key. + + + + + Returns a new instance of . + + + + + + instance used to initialize the key. + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets key size. + + + + + A wrapper class for properties that are used for token encryption. + + + + + Initializes a new instance of the class. + + + The key encryption algorithm to apply. + The encryption algorithm to apply. + + + + Gets the algorithm which used for token encryption. + + + + + Gets the algorithm which used for token encryption. + + + + + Users can override the default with this property. This factory will be used for creating encryition providers. + + + + + Gets the which used for signature valdiation. + + + + + Provides authenticated encryption and decryption services. + + + + + Initializes a new instance of the class used for encryption and decryption. + The that will be used for crypto operations. + The encryption algorithm to apply. + 'key' is null. + 'algorithm' is null or whitespace. + key size is not large enough. + 'algorithm' is not supported. + a symmetricSignatureProvider is not created. + + + + + Gets the encryption algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + initialization vector for encryption. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Decrypts ciphertext into plaintext + + the encrypted text to decrypt. + the authenticateData that is used in verification. + the initialization vector used when creating the ciphertext. + the authenticationTag that was created during the encyption. + decrypted ciphertext + 'ciphertext' is null or empty. + 'authenticatedData' is null or empty. + 'iv' is null or empty. + 'authenticationTag' is null or empty. + signature over authenticationTag fails to verify. + AES crypto operation threw. See inner exception. + + + + Checks if an 'key, algorithm' pair is supported + + the + the algorithm to check. + true if 'key, algorithm' pair is supported. + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Checks that the key has sufficient length + + that contains bytes. + the algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Contains the results of operation. + + + + + Initializes a new + + the used during + protected text. + the initialization vector used. + the bytes that need be passed to . + + + + Gets the . + + + + + Gets the Ciphertext. + + + + + Gets the initialization vector. + + + + + Gets the authentication tag + + + + + Provides Wrap key and Unwrap key services. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Unwrap a key. + + key to unwrap. + Unwrapped key. + + + + Wrap a key. + + the key to be wrapped + wrapped key. + + + + Provides RSA Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + Whether this is required to create decrypts then set this to true. + 'key' is null. + 'algorithm' is null. + The keysize doesn't match the algorithm. + If and algorithm pair are not supported. + Failed to create RSA algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Checks if an algorithm is supported. + + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using RSA decryption. + + the bytes to unwrap. + Unwrapped key + 'keyBytes' is null or length == 0. + If has been called. + Failed to unwrap the wrappedKey. + If the internal RSA algorithm is null. + + + + Wrap a key using RSA encryption. + + the key to be wrapped + A wrapped key + 'keyBytes' is null or has length == 0. + If has been called. + Failed to wrap the 'keyBytes'. + If the internal RSA algorithm is null. + + + + Provides Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + 'key' is null. + 'algorithm' is null. + If and algorithm pair are not supported. + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Returns the . + + + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + Answers if an algorithm is supported + + the + the algorithm to use + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using Symmmetric decryption. + + bytes to unwrap + Unwraped key + 'keyBytes' is null or length == 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to unwrap the wrappedKey. + + + + Wrap a key using Symmetric encryption. + + the key to be wrapped + The wrapped key result + 'keyBytes' is null or has length 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to wrap 'keyBytes'. + + + + Returns the absolute DateTime or the Seconds since Unix Epoch, where Epoch is UTC 1970-01-01T0:0:0Z. + + + + + DateTime as UTV for UnixEpoch + + + + + Per JWT spec: + Gets the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the desired date/time. + + The DateTime to convert to seconds. + if dateTimeUtc less than UnixEpoch, return 0 + the number of seconds since Unix Epoch. + + + + Creates a DateTime from epoch time. + + Number of seconds. + The DateTime in UTC. + + + + Represents a security token exception when decryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Represents a security token exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime + when decrypting a token. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Throw this exception when a received Security Token has expiration time in the past. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when 'audience' of a token was not valid. + + + + + Gets or sets the InvalidAudience that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'issuer' of a token was not valid. + + + + + Gets or sets the InvalidIssuer that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'lifetime' of a token was not valid. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'signature' of a token was not valid. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has an invalid issuer signing key. + + + + + Gets or sets the SigningKey that was found invalid. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Represents a key wrap exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security token has an effective time + in the future. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when an add to the TokenReplayCache fails. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has been replayed. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Provides extensibility for cryptographic operators. + If custom operators are needed for then can be set to + return these operators. will be before each creation. + + + + + Called to determine if a cryptographic operation is supported. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + true if supported + + + + returns a cryptographic operator that supports the algorithm. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + call when finished with the object. + + + + called to release the object returned from + + the object returned from . + + + + Defines a cache for crypto providers. + Current support is limited to only. + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + if signatureProvider is null. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + if signatureProvider is null. + true if the was added, false if the cache already contained the + if the is added will be set to 'this'. + + + + Trys to find a to this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + if signatureProvider is null. + true if the was removed, false if the was not found. + if the is removed will be set to null. + + + + ISecurityTokenValidator + + + + + Returns true if the token can be read, false otherwise. + + + + + Returns true if a token can be validated. + + + + + Gets and sets the maximum size in bytes, that a will be processed. + + + + + Validates a token passed as a string using + + + + + Interface that defines a simple cache for tacking replaying of security tokens. + + + + + Try to add a securityToken. + + the security token to add. + the time when security token expires. + true if the security token was successfully added. + + + + Try to find securityToken + + the security token to find. + true if the security token is found. + + + + Constants for JsonWebAlgorithms "kty" Key Type (sec 6.1) + http://tools.ietf.org/html/rfc7518#section-6.1 + + + + + Represents a JSON Web Key as defined in http://tools.ietf.org/html/rfc7517. + + + + + Magic numbers identifying ECDSA blob types + + + + + Returns a new instance of . + + A string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + A string that contains JSON Web Key parameters in JSON format. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets or sets the 'alg' (KeyType).. + + + + + Gets or sets the 'crv' (ECC - Curve).. + + + + + Gets or sets the 'd' (ECC - Private Key OR RSA - Private Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dp' (RSA - First Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dq' (RSA - Second Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'e' (RSA - Exponent).. + + + + + Gets or sets the 'k' (Symmetric - Key Value).. + + Base64urlEncoding + + + + Gets the key id of this . + + + + + Gets the 'key_ops' (Key Operations).. + + + + + Gets or sets the 'kid' (Key ID).. + + + + + Gets or sets the 'kty' (Key Type).. + + + + + Gets or sets the 'n' (RSA - Modulus).. + + Value is formated as: Base64urlEncoding + + + + Gets or sets the 'oth' (RSA - Other Primes Info).. + + + + + Gets or sets the 'p' (RSA - First Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'q' (RSA - Second Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'qi' (RSA - First CRT Coefficient).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'use' (Public Key Use).. + + + + + Gets or sets the 'x' (ECC - X Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the 'x5c' collection (X.509 Certificate Chain).. + + + + + Gets or sets the 'x5t' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5t#S256' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5u' (X.509 URL).. + + + + + Gets or sets the 'y' (ECC - Y Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the key size of . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets a bool that determines if the 'key_ops' (Key Operations) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'key_ops' (Key Operations) is not empty; otherwise, false. + + + + Gets a bool that determines if the 'x5c' collection (X.509 Certificate Chain) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'x5c' collection (X.509 Certificate Chain) is not empty; otherwise, false. + + + + Returns the size of key in bytes + + Represents ecdsa curve -P256, P384, P521 + Size of the key in bytes + + + + Returns the size of key in bits. + + Represents ecdsa curve -P256, P384, P512 + Size of the key in bits. + + + + Returns the magic value representing the curve corresponding to the curve id. + + Represents ecdsa curve -P256, P384, P512 + Whether the provider will create signatures or not + Uint representing the magic number + + + + Json web key converter + + + + + Convert security key into json web key. + + Security Key + json web key + + + + Convert RSA security key into json web key. + + RSA security key + json web key + + + + Convert X509 security key into json web key. + + X509 security key + json web key + + + + Convert Symmetric security key into json web key. + + Symmetric security key + json web key + + + + Constants for JsonWebKey Elliptical Curve Types + https://tools.ietf.org/html/rfc7518#section-6.2.1.1 + + + + + Names for Json Web Key Values + + + + + Contains a collection of that can be populated from a json string. + + provides support for http://tools.ietf.org/html/rfc7517. + + + + Returns a new instance of . + + a string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + a json string containing values. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of from a json string. + + a json string containing values. + jsonSerializerSettings + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets the . + + + + + Returns the JsonWebKeys as a . + + + + + Names for Json Web Key Set Values + + + + + Constants for JsonWebKeyUse (sec 4.2) + http://tools.ietf.org/html/rfc7517#section-4 + + + + + Log messages and codes + + + + + + + + + + + + + Detects if RSACng is available + + + + + + The purpose of this class is to ensure that we obtain an RsaCryptoServiceProvider that supports SHA-256 signatures. + If the original RsaCryptoServiceProvider doesn't support SHA-256, we create a new one using the same KeyContainer. + + + + + Initializes an new instance of . + + + + + + Destructs the instance. + + + + + Releases all resources used by the current instance of the class. + + + + + Decrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be decrypted. + true to perform direct System.Security.Cryptography.RSA decryption using OAEP padding (only available on a computer running Microsoft Windows XP or later);o + therwise, false to use PKCS#1 v1.5 padding. + + + + + Encrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be encrypted. + true to perform direct System.Security.Cryptography.RSA encryption using OAEP padding (only available on a computer running Microsoft Windows XP or later); + otherwise, false to use PKCS#1 v1.5 padding. + + + + + Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. + + The input byte array for which to compute the hash. + The hash algorithm to use to create the hash value. + The Signature for the specified data. + + + + Verifies that a digital signature is valid by determining the hash value in the signature using the provided public key and comparing it to the hash value of the provided data. + + The input byte array. + The hash algorithm to use to create the hash value. + The signature byte array to be verified. + true if the signature is valid; otherwise, false. + + + + Represents a Rsa security key. + + + + + Initializes a new instance of the class. + + + + + + Initializes a new instance of the class. + + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets RSA key size. + + + + + used to initialize the key. + + + + + instance used to initialize the key. + + + + + Constants for Security Algorithm. + + + + + Base class for Security Key. + + + + + This must be overridden to get the size of this . + + + + + Gets the key id of this . + + + + + Gets or sets . + + + + + Contains information about the keys inside the tokens. + + + + + Base class for security token. + + + + + This must be overridden to get the Id of this . + + + + + This must be overridden to get the issuer of this . + + + + + This must be overridden to get the . + + + + + This must be overridden to get or set the that signed this instance. + + .ValidateToken(...) can this value when a is used to successfully validate a signature. + + + + This must be overridden to get the time when this was Valid. + + + + + This must be overridden to get the time when this is no longer Valid. + + + + + Contains some information which used to create a security token. + + + + + Gets or sets the value of the 'audience' claim. + + + + + Gets or sets the used to create a encrypted security token. + + + + + Gets or sets the value of the 'expiration' claim. + + + + + Gets or sets the issuer of this . + + + + + Gets or sets the time the security token was issued. + + + + + Gets or sets the notbefore time for the security token. + + + + + Gets or sets the used to create a security token. + + + + + Gets or sets the . + + + + + Defines the interface for a Security Token Handler. + + + + + Creates an instance of + + + + + Returns . + + + true if attached; otherwise, false. + + + + Returns . + + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'True' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize token handled + by this instance. + + true if the WriteToken method can serialize this token. + + + + This must be overridden to get the System.Type of the SecurityToken this instance handles. + + + + + Indicates whether the current token string can be read as a token + of the type handled by this instance. + + The token string thats needs to be read. + 'True' if the ReadToken method can parse the token string. + + + + Gets and sets the maximum token size in bytes that will be processed. + + 'value' less than 1. + + + + Deserializes from string a token of the type handled by this instance. + + The string to be deserialized. + SecurityToken instance which represents the serialized token. + + + + Gets security token. + + . + SecurityToken instance which represents the serialized token. + + + + Serializes to string a token of the type handled by this instance. + + A token of type TokenType. + The serialized token. + + + + This must be overridden to serialize to XML a token of the type handled by this instance. + + The XML writer. + A token of type . + + + + This must be overridden to deserialize token with the provided . + + . + the current . + SecurityToken instance which represents the serialized token. + + + + This must be overridden to validate a token passed as a string using + + A token of type . + the current . + The token of type that was validated. + + + + Provides signature services, signing and verifying. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + 'key' is null. + 'algorithm' is null or empty. + + + + Gets the signature algorithm. + + + + + Gets or sets a user context for a . + + + + + Gets or sets the that is associated with this + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Gets the . + + + + + This must be overridden to produce a signature over the 'input'. + + bytes to sign. + signed bytes + + + + This must be overridden to verify a signature created over the 'input'. + + bytes to verify. + signature to compare against. + true if the computed signature matches the signature parameter, false otherwise. + + + + Gets or sets a bool indicating if this is expected to create signatures. + + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + The digest algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + if 'digest' is null or empty. + + + + Gets the signature algorithm. + + if 'value' is null or empty. + + + + Gets the digest algorithm. + + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + This will have precedence over + + + + Gets the used for signature creation or validation. + + + + + Gets the key id associated with . + + + + + Represents a symmetric security key. + + + + + Returns a new instance of instance. + + The byte array of the key. + + + + Gets the key size. + + + + + Gets the byte array of the key. + + + + + Provides signing and verifying operations using a and specifying an algorithm. + + + + + This is the minimum .KeySize when creating and verifying signatures. + + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + indicates if this will be used to create signatures. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Gets or sets the minimum .KeySize"/>. + + 'value' is smaller than . + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Returns the . + + The hash algorithm to use to create the hash value. + The byte array of the key. + + + + + Gets the for this . + + + + + Produces a signature over the 'input' using the and 'algorithm' passed to . + + The bytes to sign. + Signed bytes + 'input' is null. + 'input.Length' == 0. + has been called. + is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + number of bytes of signature to use. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + 'length < 1' + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Definition for AudienceValidator. + + The audiences found in the . + The being validated. + required for validation. + true if the audience is considered valid. + + + + Definition for IssuerSigningKeyResolver. + + The representation of the token that is being validated. + The that is being validated. It may be null. + A key identifier. It may be null. + required for validation. + A to use when validating a signature. + + + + Definition for IssuerSigningKeyValidator. + + The that signed the . + The being validated. + required for validation. + + + + Definition for IssuerValidator. + + The issuer to validate. + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + The delegate should return a non null string that represents the 'issuer'. If null a default value will be used. + + + + Definition for LifetimeValidator. + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + + + + Definition for TokenReplayValidator. + + The 'expiration' time found in the . + The being validated. + required for validation. + + + + + Definition for SignatureValidator. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenReader. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenDecryptionKeyResolver. + + The representation of the token to be decrypted. + The to be decrypted. The runtime by default passes null. + A key identifier. It may be null. + required for validation. + A to use when decrypting the token. + + + + Contains a set of parameters that are used by a when validating a . + + + + + This is the fallback authenticationtype that a will use if nothing is set. + + + + + Default for the clock skew. + + 300 seconds (5 minutes). + + + + Default for the maximm token size. + + 2 MB (mega bytes). + + + + Copy constructor for . + + + + + Initializes a new instance of the class. + + + + + Gets or sets . + + + + + Gets or sets a delegate that will be used to validate the audience. + + + If set, this delegate will be called to validate the 'audience' instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to read the token. + + + If set, this delegate will be called to read the token instead of normal processing. + + + + + Gets or sets the AuthenticationType when creating a . + + If 'value' is null or whitespace. + + + + Gets or sets the clock skew to apply when validating a time. + + If 'value' is less than 0. + + + + Returns a new instance of with values copied from this object. + + A new object copied from this object + This is a shallow Clone. + + + + Creates a using: + + 'NameClaimType': If NameClaimTypeRetriever is set, call delegate, else call NameClaimType. If the result is a null or empty string, use . + 'RoleClaimType': If RoleClaimTypeRetriever is set, call delegate, else call RoleClaimType. If the result is a null or empty string, use . + + A with Authentication, NameClaimType and RoleClaimType set. + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + + + + Gets or sets the that is to be used for decryption. + + + + + Gets or sets a delegate that will be called to retreive a used for decryption. + + + This will be used to decrypt the token. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets a delegate for validating the that signed the token. + + + If set, this delegate will be called to validate the that signed the token, instead of normal processing. + + + + + Gets or sets the that is to be used for signature validation. + + + + + Gets or sets a delegate that will be called to retrieve a used for signature validation. + + + This will be used to check the signature. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets an used for signature validation. + + + + + Gets or sets a delegate that will be used to validate the issuer of the token. + + + If set, this delegate will be called to validate the 'issuer' of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the lifetime of the token + + + If set, this delegate will be called to validate the lifetime of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the token replay of the token + + + If set, this delegate will be called to validate the token replay of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a that defines the . + + + Controls the value returns. It will return the first where the equals . + + + + + Gets or sets the that defines the . + + + Controls the results of . + Each where == will be checked for a match against the 'string' passed to . + + + + + Gets or sets a delegate that will be called to obtain the NameClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a value indicating whether tokens must have an 'expiration' value. + + + + + Gets or sets a value indicating whether a can be considered valid if not signed. + + + + + Gets or sets a delegate that will be called to obtain the RoleClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a boolean to control if the original token should be saved after the security token is validated. + + The runtime will consult this value and save the original token that was validated. + + + + Gets or sets a delegate that will be used to validate the signature of the token. + + + If set, this delegate will be called to signature of the token, instead of normal processing. + + + + + Gets or sets the that is to be used for decrypting inbound tokens. + + + + + Gets or set the that store tokens that can be checked to help detect token replay. + + If set, then tokens must have an expiration time or the runtime will fault. + + + + Gets or sets a value indicating if an actor token is detected, whether it should be validated. + + + + + Gets or sets a boolean to control if the audience will be validated during token validation. + + Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. + A forwarded token would contain the audience of the original site. + + + + Gets or sets a boolean to control if the issuer will be validated during token validation. + + + Validation of the issuer mitigates forwarding attacks that can occur when an + IdentityProvider represents multiple tenants and signs tokens with the same keys. + It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from + contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. A application that accepts tokens from fabrikam could forward them + to the application that accepts tokens for contoso. + + + + + Gets or sets a boolean to control if the lifetime will be validated during token validation. + + + + + Gets or sets a boolean that controls if validation of the that signed the securityToken is called. + + It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, + which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. + + + + Gets or sets a boolean to control if the token replay will be validated during token validation. + + + + + Gets or sets a string that represents a valid audience that will be used to check against the token's audience. + + + + + Gets or sets the that contains valid audiences that will be used to check against the token's audience. + + + + + Gets or sets a that represents a valid issuer that will be used to check against the token's issuer. + + + + + Gets or sets the that contains valid issuers that will be used to check against the token's issuer. + + + + + Generates unique IDs. + + + + + Creates a unique ID suitable for use in an xml:id field. The value is + not hard to guess but is unique. + + The unique ID. + + + + Creates a unique ID similar to that created by CreateNonRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The unique ID, with the given prefix. + + + + Creates a unique, random ID suitable for use in an xml:id field. The + value is hard to guess and unique. + + The unique ID. + + + + Creates a unique, random ID similar to that created by CreateRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The random URI. + + + + Creates a unique, random ID suitable for use as a URI. The value is + hard to guess and unique. The URI is in the urn:uuid: namespace. + + The random URI. + + + + Contains some utility methods. + + + + + A string with "empty" value. + + + + + A string with "null" value. + + + + + Creates a copy of the byte array. + + The resource array. + A copy of the byte array. + + + + Serializes the list of strings into string as follows: + 'str1','str2','str3' ... + + + The strings used to build a comma delimited string. + + + The single . + + + + + Returns whether the input string is https. + + The input string. + true if the input string is https; otherwise, false. + + + + Returns whether the input uri is https. + + . + true if the input uri is https; otherwise, false. + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + + true if the bytes are equal, false otherwise. + + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + length of array to check + + true if the bytes are equal, false otherwise. + + + + + AudienceValidator + + + + + Determines if the audiences found in a are valid. + + The audiences found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'audiences' is null and is true. + If is null or whitespace and is null. + If none of the 'audiences' matched either or one of . + An EXACT match is required. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + If 'vaidationParameters' is null. + If 'issuer' is null or whitespace and is true. + If is null or whitespace and is null. + If 'issuer' failed to matched either or one of . + An EXACT match is required. + + + + Validates the that signed a . + + The that signed the . + The being validated. + required for validation. + if 'securityKey' is null and ValidateIssuerSigningKey is true. + if 'securityToken' is null and ValidateIssuerSigningKey is true. + if 'vaidationParameters' is null. + + + + Validates the lifetime of a . + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'expires.HasValue' is false and is true. + If 'notBefore' is > 'expires'. + If 'notBefore' is > DateTime.UtcNow. + If 'expires' is < DateTime.UtcNow. + All time comparisons apply . + + + + Validates if a token has been replayed. + + When does the security token expire. + The being validated. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Validates if a token has been replayed. + + The being validated. + When does the security token expire. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Security key that allows access to cert + + + + + Instantiates a using a + + The cert to use. + + + + Gets the key size. + + + + + Gets the X5t of this . + + + + + Returns the private key from the . + + + + + Gets the public key from the . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets the . + + + + + Returns a bool indicating if this key is equivalent to another key. + + true if the keys are equal; otherwise, false. + + + + Returns an int hash code. + + An int hash code + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + + + + Initializes a new instance of the class. + + A that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Gets the used by this instance. + + + + diff --git a/Bin/Microsoft.IdentityModel.Xml.dll b/Bin/Microsoft.IdentityModel.Xml.dll new file mode 100644 index 0000000..b2522dd Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Xml.dll differ diff --git a/Bin/Microsoft.IdentityModel.Xml.dll.refresh b/Bin/Microsoft.IdentityModel.Xml.dll.refresh new file mode 100644 index 0000000..1feb494 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Xml.dll.refresh differ diff --git a/Bin/Microsoft.IdentityModel.Xml.pdb b/Bin/Microsoft.IdentityModel.Xml.pdb new file mode 100644 index 0000000..f6a71d3 Binary files /dev/null and b/Bin/Microsoft.IdentityModel.Xml.pdb differ diff --git a/Bin/Microsoft.IdentityModel.Xml.xml b/Bin/Microsoft.IdentityModel.Xml.xml new file mode 100644 index 0000000..c67bfb2 --- /dev/null +++ b/Bin/Microsoft.IdentityModel.Xml.xml @@ -0,0 +1,1680 @@ + + + + Microsoft.IdentityModel.Xml + + + + + Defines a XML transform that applies C14n canonicalization and produces a hash over the transformed XML nodes. + + + + + Gets the algorithm + + + + + Gets or sets a value indicating if this transform should include comments. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Processes a set of XML nodes and returns the hash of the octets. + + the that has the XML nodes to process. + the to use + the hash of the processed XML nodes. + + + + Wraps a delegates to InnerReader. + + + + + Creates a new . + + + + + Gets or sets the Inner . + + + + + Gets the value of the InnerReaders's attribute with the specified index. + + index of the attribute. + Attribute value at the specified index. + + + + Gets the value of the InnerReaders's attribute with the specified Name. + + The qualified name of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the value of the InnerReaders's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the number of InnerReaders's attributes at the current reader position. + + + + + Gets the InnerReaders's base Uri of the current node. + + + + + Gets a value indicating if the InnerReader can read binary content + + + + + Gets a value indicating if the InnerReader can read value chunk. + + + + + Gets the InnerReaders's current depth. + + + + + Gets a value indicating if the InnerReader is positioned at the end of the stream. + + + + + Gets a value indicating if the InnerReader current node has a Value. + + + + + Gets a value indicating if the InnerReader's current node is an attribute that + was generated from the default value defined in the DTD or Schema. + + + + + Gets a value indicating if the InnerReader's current node is empty. + + + + + Gets the InnerReader's LineNumber + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LinePosition. + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LocalName of the current node. + + + + + Gets the InnerReader's Name of the current node. + + + + + Gets the InnerReader's NamespaceURI of the current node. + + + + + Gets the InnerReader's XmlNameTable at the current node. + + + + + Gets the type of the InnerReader's current node type. + + + + + Gets the prefix of the InnerReader's current node. + + + + + Gets the quotation mark character used to enclose the attribute node. (" or ') + + + + + Gets the InnerReader's ReadState. + + + + + Gets the Value of the InnerReader's current node. + + + + + Gets the ValueType of InnerReader's current node. + + + + + Gets the InnerReader's XmlLang. + + + + + Gets the InnerReader's XmlSpace. + + + + + Closes the reader and changes the System.Xml.XmlReader.ReadState + to Closed. + + + + + Gets the value of the InnerReader's attribute at the given index. + + The index of the attribute. The index is 0 based index. + The value of the attribute at the specified index. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name. + + The qualified name of the attribute. + The value of the attribute. If the attribute is not found null + is returned. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name and namespace Uri. + + The local name of the attribute. + The namespace of the attribute. + The value of the attribute. If the attribute is not found + null is returned. + The method does not move the reader. + + + + Gets a value indicating if the InnerReader HasLineInfo + + + + + Resolves the InnerReader's namespace prefix in the current element scope. + + Prefix whose namespace Uri to be resolved. + The namespace Uri to which the prefix matches or null if no matching + prefix is found. + + + + Moves to the InnerReader's attribute with the specified index. + + The index of the attribute. + + + + Moves to the InnerReader's attribute with the given local name. + + The qualified name of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves to the InnerReader's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves the InnerReader to a node of type Element. + + true if the reader is positioned on an element else false + + + + Moves the InnerReader to the first attribute. + + Returns true if the reader is positioned at a attribute else false. + When returning false the reader position will not be changed. + + + + Moves the InnerReader to the next attribute. + + Returns true if the reader is positioned at an attribute else false. + When returning false the reader position will not be changed. + + + + Reads the InnerReader's next node from the stream. + + true if the next node was read successfully. + + + + Parses the InnerReader's attribute value into one or more Text, EntityReference, or EndEntity nodes. + + true if there are nodes to return.false if the reader is not positioned on + an attribute node when the initial call is made or if all the attribute values + have been read. + + + + Reads the InnerReader's content and returns the Base64 decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Reads the InnerReader's content and returns the BinHex decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Resolves the InnerReader's EntityReference nodes. + + + + + Reads large streams of text embedded in an XML document from the InnerReader. + + The array of characters that serves as the buffer to which the text contents + are written. This value cannot be null. + The offset within the buffer where the System.Xml.XmlReader can start to + copy the results. + The maximum number of characters to copy into the buffer. The actual number + of characters copied is returned from this method. + The number of characters read into the buffer. The value zero is returned + when there is no more text content. + + + + Gets the + + if is null. + + + + Wraps a and delegates to InnerWriter. + + + + + Initializes a new instance of + + + + + Gets or sets a for tracing. + + if 'value' is null. + + + + Gets or sets the InnerWriter. + + if 'value' is null. + + + + Closes the underlying stream. + + + + + Flushes the underlying stream. + + + + + Encodes the specified binary bytes as Base64 and writes out the resulting text. + + Byte array to encode. + The position in the buffer indicating the start of the bytes to write. + The number of bytes to write. + + + + Writes out a CDATA block containing the specified text. + + The text to place inside the CDATA block. + + + + Forces the generation of a character entity for the specified Unicode character value. + + The Unicode character for which to generate a character entity. + + + + When overridden in a derived class, writes text one buffer at a time. + + Character array containing the text to write. + The position in the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes out a comment containing the specified text. + + Text to place inside the comment. + + + + Writes the DOCTYPE declaration with the specified name and optional attributes. + + The name of the DOCTYPE. This must be non-empty. + If non-null it also writes PUBLIC "pubid" "sysid" where pubid and sysid are + replaced with the value of the given arguments. + If pubid is null and sysid is non-null it writes SYSTEM "sysid" where sysid + is replaced with the value of this argument. + If non-null it writes [subset] where subset is replaced with the value of + this argument. + + + + Closes the previous System.Xml.XmlWriter.WriteStartAttribute(System.String,System.String) call. + + + + + Closes any open elements or attributes and puts the writer back in the Start state. + + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out an entity reference as name. + + The name of the entity reference. + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out a processing instruction with a space between the name and text as follows: <?name text?>. + + The name of the processing instruction. + The text to include in the processing instruction. + + + + When overridden in a derived class, writes raw markup manually from a character buffer. + + Character array containing the text to write. + The position within the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes raw markup manually from a string. + + String containing the text to write. + + + + Writes the start of an attribute with the specified local name and namespace URI. + + The namespace prefix of the attribute. + The local name of the attribute. + The namespace URI for the attribute. + + + + When overridden in a derived class, writes the XML declaration with the version "1.0". + + + + + When overridden in a derived class, writes the XML declaration with the version + "1.0" and the standalone attribute. + + If true, it writes "standalone=yes"; if false, it writes "standalone=no". + + + + When overridden in a derived class, writes the specified start tag and associates + it with the given namespace and prefix. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + When overridden in a derived class, gets the state of the writer. + + + + + Writes the given text content. + + The text to write. + + + + Generates and writes the surrogate character entity for the surrogate character pair. + + The low surrogate. This must be a value between 0xDC00 and 0xDFFF. + The high surrogate. This must be a value between 0xD800 and 0xDBFF. + + + + Writes out the given white space. + + The string of white space characters. + + + + Writes an attribute as a xml attribute with the prefix 'xml:'. + + Localname of the attribute. + Attribute value. + + + + Writes an xmlns namespace declaration. + + The prefix of the namespace declaration. + The namespace Uri itself. + + + + Returns the closest prefix defined in the current namespace scope for the namespace URI. + + The namespace URI whose prefix to find. + The matching prefix or null if no matching namespace URI is found in the + current scope. + + + + Gets the + + if is null. + + + + Base class for a XmlDsig element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/ + + + + + Initializes a instance. + + + + + Gets or sets the Id. + + + + + Gets or sets the prefix associated with the element. + + + + + Reads and writes XML associated with XML DSig https://www.w3.org/TR/2001/PR-xmldsig-core-20010820 + + + + + Returns the default instance. + + + + + Static constructor that initializes the default . + + + + + Initializes an instance of + + + + + Gets or sets the prefix to use when writing the Signature element. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + pointing positioned on a <KeyInfo> element. + if is null. + if there is a problem reading the XML. + Only handles IssuerSerial, Ski, SubjectName, Certificate. Unsupported types are skipped. Only a X509 data element is supported. + + + + Reads the "X509DataElement" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "X509IssuerSerial" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "RSAKeyValue" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-RSAKeyValue. + + A positioned on a element. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + a positioned on a <Signature> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + a positioned on a <SignedInfo> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + a positioned on a <Reference> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Transforms + + a positioned on a <Transforms> element. + a to attach transforms. + if is null. + if is null. + if there is a problem reading the XML. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignatureMethod + + a positioned on a <SignatureMethod> element. + if is null. + if there is a problem reading the XML. + A string with the signature method. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-CanonicalizationMethod + + a positioned on a <CanonicalizationMethod> element. + if is null. + if there is a problem reading the XML. + A string with the canonicalization method. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo. + + the to use. + the to write. + if is null. + if is null. + if there is a problem writing the XML. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference. + + the to use. + the to write. + Assumes the <DigestValue> has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null or empty. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature. + + the to use. + the to write. + Assumes the <SignatureValue> has been calculated, no canonicalization or signature calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo. + + the to use. + the to write. + Assumes the <Reference> digest has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if .Count > 1. + if is null or empty. + + + + Gets or sets the to use when processing transforms in References + + + + + Wraps a pointing to a root element of XML that may contain a signature. + If a Signature element is found, a will be populated and will + have set for future validation. + + + + + Initializes an instance of + + a pointing to XML that may contain an enveloped signature. + If a <Signature> element is found, the will be set. + if is null. + + + + Gets or sets the to use when reading XmlDSig elements. + + if 'value' is null. + + + + Called after the root element has been completely read. + Attaches a to the first Reference for future processing if + a signature was found. + + + + + Keeps track of the XML Element count. If a signature is detected it is read. + + 'true' if the next node was read successfully; 'false' if there are no more nodes. + if more than one signature is found. + if a <Reference> element was not found in the <SignedInfo>. + + + + Gets the that was found inside the XML. + + may be null. + + + + Defines a XML transform that removes the XML nodes associated with the Signature. + + + + + Creates an EnvelopedSignatureTransform + + + + + Gets the Algorithm associated with this transform + + + + + Sets the reader to exclude the <Signature> element + + to process. + with exclusion set. + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Represents an exception thrown when processing xml. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs reading XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when a problem occurs when validating the XML <Signature>. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs writing XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents Canonicalization algorithms found in <SignedInfo> and in <Reference>. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + controls if the transform will include comments. + + + + Gets the Algorithm associated with this transform + + + + + Applies a canonicalization transform over a set of XML nodes and computes the hash value. + + the set of XML nodes to transform. + the hash algorithm to apply. + the hash of the transformed octets. + + + + Represents the IssuerSerial property of X509Data as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + + + + Gets the IssuerName of the IssuerSerial. + + + + + Gets the SerialNumber of the IssuerSerial. + + + + + Creates an IssuerSerial using the specified IssuerName and SerialNumber. + + + + + Compares two IssuerSerial objects. + + + + + Serves as a hash function for IssuerSerial. + + + + + Represents a XmlDsig KeyInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + Only a single 'X509Certificate' is supported. Multiples that include intermediate and root certs are not supported. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + the to populate the X509Data. + + + + Initializes an instance of . + + the to populate the . + + + + Gets or sets the 'KeyName' that can be used as a key identifier. + + + + + Gets or sets the Uri associated with the RetrievalMethod + + + + + Gets or sets the RSAKeyValue. + + + + + Gets the 'X509Data' value. + + + + + Compares two KeyInfo objects. + + + + + Serves as a hash function for KeyInfo. + + + + + Returns true if the KeyInfo object can be matched with the specified SecurityKey, returns false otherwise. + + + + + Log messages and codes for XmlProcessing + + + + + Represents a XmlDsig Reference element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + + + + Initializes an instance of + + + + + Initializes an instance of + + the to apply. + the to use. + if is null. + if is null. + + + + Gets or sets the CanonicalizingTransform + + if 'value' is null. + + + + Gets or sets the DigestMethod to use when creating the hash. + + if 'value' is null or empty. + + + + Gets or sets the Base64 encoding of the hashed octets. + + if 'value' is null or empty. + + + + Gets or sets the that is associated with the . + + if 'value' is null. + + + + Gets the of transforms to apply. + + + + + Gets or sets the Type of this Reference. + + + + + Gets or sets the Uri of this Reference. + + + + + Verifies that the equals the hashed value of the after + have been applied. + + supplies the . + if is null. + + + + Writes into a stream and then hashes the bytes. + + the set of XML nodes to read. + the hash algorithm to apply. + hash of the octets. + + + + Computes the digest of this reference by applying the transforms over the tokenStream. + + the that will supply the . + The digest over the after all transforms have been applied. + if is null. + if is null. + if is not supported. + if .CreateHashAlgorithm returns null. + + + + The RSAKeyValue found inside of the KeyValue element. + + + + + The modulus of the RSAKeyValue. + + + + + The exponent of the RSAKeyValue. + + + + + Creates an RSAKeyValue using the specified modulus and exponent. + + + + + Compares two RSAKeyValue objects. + + + + + Serves as a hash function for RSAKeyValue. + + + + + Represents a XmlDsig Signature element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + + + + Initializes a instance. + + + + + Initializes a instance. + + associated with this Signature. + if if null. + + + + Gets or sets the KeyInfo + + + + + Gets or sets the SignatureValue + + if 'value' is null or empty. + + + + Gets or sets the . + + if 'value' is null. + + + + Verifies the signature over the SignedInfo. + + the to use for cryptographic operations. + the to obtain cryptographic operators. + if is null. + if is null. + if null. + if is not supported. + if signature does not validate. + + + + Represents a XmlDsig SignedInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + + + + Initializes a instance. + + + + + Initializes a instance. + + a to include. + if is null. + + + + Gets or sets the CanonicalizationMethod + + if 'value' is null. + if 'value' is not one of: + "http://www.w3.org/2001/10/xml-exc-c14n#" + "http://www.w3.org/2001/10/xml-exc-c14n#WithComments" + + + + + Gets or sets the Reference. + + if 'value' is null. + + + + Gets or sets the SignatureMethod. + + if 'value' is null. + + + + Verifies the digest of all . + + supplies any required cryptographic operators. + if is null. + + + + Writes the Canonicalized bytes into a stream. + + the to receive the bytes. + + + + Defines a XMLTransform + + + + + Called to transform a + + the to process. + + + + + Gets the algorithm + + + + + + + + + Static constructor that initializes the default . + + + + + Gets the default instance of + + + + + Determine if the transform is supported. + + the name of the transform. + if the transform is supported + + + + Determine if the canonicalizing transform is supported. + + the name of the canonicalizing transform. + if the canonicalizing transform is supported + + + + Gets a XML transform that modifies a XmlTokenStream. + + the name of the transform. + + + + + Gets a XML transform that is capable of Canonicalizing XML and returning bytes. + + the name of the transform. + + + + + Represents a XmlDsig X509Data element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + Supports multiple certificates. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + If 'certificate' is null + + + + Initializes an instance of . + + If 'certificates' is null + + + + Gets or sets the 'X509IssuerSerial' that is part of a 'X509Data'. + + + + + Gets or sets the 'X509SKI' value that is a part of 'X509Data'. + + + + + Get or sets the 'X509SubjectName' value that is a part of 'X509Data'. + + + + + Get the collection of X509Certificates that is associated with 'X509Data'. + + + + + Get or sets the 'CRL' value that is a part of 'X509Data'. + + + + + Compares two X509Data objects. + + + + + Serves as a hash function for X509Data. + + + + + Constants for XML Signature + Definitions for namespace, attributes and elements as defined in http://www.w3.org/TR/xmldsig-core/ + + + + + Maintains a collection of XML nodes obtained when reading signed XML. + + + + + Initializes a + + + + + Adds a XML node to the collection. + + + + if is null. + + + + Adds a XML attribute node to the collection + + the XML prefix. + the local name of the attribute. + the namespace of the attribute. + the value of the attribute. + if is null or empty. + + + + Adds a XML element node to the collection + + the XML prefix. + the local name of the element. + the namespace of the attribute. + value indicating if the element is empty. + if is null or empty. + + + + Sets the name and namespace of which element to exclude. Normally this is the <Signature> element. + + the name of the Element to exclude. + the namespace of the Element to exclude. + if is null or empty. + + + + Writes the XML nodes into the . + + the to use. + if is null. + + + + An XmlReader that captures xml as a XmlTokenStream + + + + + Initializes a new instance of for creating a . + + an to capture the . + if if null. + if .IsStartElement() is false. + + + + Gets the + + + + + Delegates to InnerReader, then calls Record() + + + + + Utilities for working with XML + + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at at expected element. + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + the expected namespace. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at expected element. + + + + Determine if reader is at expected element in one of the listed namespace in namespaceList. + + the to check. + the expected element. + the expected namespace list. + if is at expected element. + if is null. + if is null or empty. + + + + Determines if a Qualified names equals a name / namespace pair. + + the to compare. + the name to compare. + the namepace to compare. + + + + + + + + Hex representation of bytes + + + + Gets the xsi:type as a for the current element. + + an pointing at an Element. + if is null. + a if the current element has an XSI type. + If is not on an element OR xsi type is not found, null. + + + + Determines if the has an attribute that is 'nil' + + a positioned on an element. + if is null. + true is the attribute value is 'nil' + + + + Normalizes an empty string to 'null'. + + + null if string is null or empty. + + + + Returns a new with message including the element and attribute. + + the missing element. + the missing attribute. + a . + + + + Determines if the prefix on a name maps to a namespace that is in scope the reader. + + the in scope. + the qualifiedName to check. + if is null. + if is null. + a with the namespace that was in scope. If the prefix was not in scope, the namespace will be null. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + if is null. + if is null. + if is null. + if the does require an xsi:type attribute to be present. If the xsi:type is present, it will be validated. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + controls if the xsi:type must be present. + if is null. + if is null. + if is null. + if xsi:type is not found and required. + if xsi:type is found and did not match expected. + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + diff --git a/Bin/Newtonsoft.Json.dll b/Bin/Newtonsoft.Json.dll new file mode 100644 index 0000000..bc3ef13 Binary files /dev/null and b/Bin/Newtonsoft.Json.dll differ diff --git a/Bin/Newtonsoft.Json.dll.refresh b/Bin/Newtonsoft.Json.dll.refresh new file mode 100644 index 0000000..597065f Binary files /dev/null and b/Bin/Newtonsoft.Json.dll.refresh differ diff --git a/Bin/Newtonsoft.Json.xml b/Bin/Newtonsoft.Json.xml new file mode 100644 index 0000000..157e1f7 --- /dev/null +++ b/Bin/Newtonsoft.Json.xml @@ -0,0 +1,10752 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an Entity Framework to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Represents a collection of . + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously skips the children of the current token. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously ets the state of the . + + The being written. + The value being written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Represents a JSON array. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a JSON constructor. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the list changes or an item in the list changes. + + + + + Occurs before an item is added to the collection. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Occurs when a property value is changing. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Represents a JSON property. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a raw JSON string. + + + + + Asynchronously creates an instance of with the content of the reader's current token. + + The reader. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns an instance of with the content of the reader's current token. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Represents a view of a . + + + + + Initializes a new instance of the class. + + The name. + + + + When overridden in a derived class, returns whether resetting an object changes its value. + + + true if resetting the component changes its value; otherwise, false. + + The component to test for reset capability. + + + + When overridden in a derived class, gets the current value of the property on a component. + + + The value of a property for a given component. + + The component with the property for which to retrieve the value. + + + + When overridden in a derived class, resets the value for this property of the component to the default value. + + The component with the property value that is to be reset to the default value. + + + + When overridden in a derived class, sets the value of the component to a different value. + + The component with the property value that is to be set. + The new value. + + + + When overridden in a derived class, determines a value indicating whether the value of this property needs to be persisted. + + + true if the property should be persisted; otherwise, false. + + The component with the property to be examined for persistence. + + + + When overridden in a derived class, gets the type of the component this property is bound to. + + + A that represents the type of component this property is bound to. + When the or + + methods are invoked, the object specified might be an instance of this type. + + + + + When overridden in a derived class, gets a value indicating whether this property is read-only. + + + true if the property is read-only; otherwise, false. + + + + + When overridden in a derived class, gets the type of the property. + + + A that represents the type of the property. + + + + + Gets the hash code for the name of the member. + + + + The hash code for the name of the member. + + + + + Represents an abstract JSON token. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Writes this token to a asynchronously. + + A into which this method will write. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets the default members search flags. + + The default members search flags. + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer that writes to the application's instances. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + diff --git a/Bin/Sustainsys.Saml2.HttpModule.dll b/Bin/Sustainsys.Saml2.HttpModule.dll new file mode 100644 index 0000000..1f925cc Binary files /dev/null and b/Bin/Sustainsys.Saml2.HttpModule.dll differ diff --git a/Bin/Sustainsys.Saml2.HttpModule.dll.refresh b/Bin/Sustainsys.Saml2.HttpModule.dll.refresh new file mode 100644 index 0000000..fdd97bc Binary files /dev/null and b/Bin/Sustainsys.Saml2.HttpModule.dll.refresh differ diff --git a/Bin/Sustainsys.Saml2.HttpModule.xml b/Bin/Sustainsys.Saml2.HttpModule.xml new file mode 100644 index 0000000..3f5b880 --- /dev/null +++ b/Bin/Sustainsys.Saml2.HttpModule.xml @@ -0,0 +1,106 @@ + + + + Sustainsys.Saml2.HttpModule + + + + + Extension methods to CommandResult to update a HttpResponseBase. + + + + + Apply the command result to a bare HttpResponse. + + The CommandResult that will update the HttpResponse. + Http Response to write the result to. + Include a SameSite=None attribute on any cookies set + Path of Sustainsys.Saml2 instance - used for isolation of data protection + + + + Apply cookies of the CommandResult to the response. + + Commandresult + Response + Include a SameSite=None attribute on any cookies set + Path of Sustainsys.Saml2 instance - used for isolation of data protection + + + + Apply headers of the command result to the response. + + Command result containing headers. + Response to set headers in. + + + + Establishes an application session by calling the session authentication module. + + + + + Static class that hold extension methods for . + + + + + Purpose string used with data protection. + + + + + Extension method to convert a HttpRequestBase to a HttpRequestData. + + The request object used to populate the HttpRequestData. + Path of Sustainsys.Saml2 instance - used for isolation of data protection + The HttpRequestData object that has been populated by the request. + + + + Extension method to convert a HttpRequestBase to a HttpRequestData. + + The request object used to populate the HttpRequestData. + Ignore cookies when extracting data. + This is useful for the stub idp that might see the relay state + and the requester's cookie, but shouldn't try to decrypt it. + Path of Sustainsys.Saml2 instance - used for isolation of data protection + The HttpRequestData object that has been populated by the request. + + + + Http Module for SAML2 authentication. The module hijacks the + ~/Saml2AuthenticationModule/ path of the http application to provide + authentication services. + + + + + The one and only options instance used by the + . It is instantiated by + loading the web.config, but after that it can be modified or even + replaced from code. + + + + + Init the module and subscribe to events. + + + + + + Begin request handler that captures all traffic to configured module + path. + + The http application. + Ignored + + + + IDisposable implementation. + + + + diff --git a/Bin/Sustainsys.Saml2.dll b/Bin/Sustainsys.Saml2.dll new file mode 100644 index 0000000..6d2203d Binary files /dev/null and b/Bin/Sustainsys.Saml2.dll differ diff --git a/Bin/Sustainsys.Saml2.dll.refresh b/Bin/Sustainsys.Saml2.dll.refresh new file mode 100644 index 0000000..66c122d Binary files /dev/null and b/Bin/Sustainsys.Saml2.dll.refresh differ diff --git a/Bin/Sustainsys.Saml2.xml b/Bin/Sustainsys.Saml2.xml new file mode 100644 index 0000000..0fdd449 --- /dev/null +++ b/Bin/Sustainsys.Saml2.xml @@ -0,0 +1,4509 @@ + + + + Sustainsys.Saml2 + + + + + Is this certificate for current or future use? + + + + + The certificate is used for current requests + + + + + The certificate is used for current and/or future requests + + + + + How is the certificate used? + + + + + The certificate is used for either signing or encryption, or both. + Equivalent to Signing | Encryption. + + + + + The certificate is used for signing outbound requests + + + + + The certificate is used for decrypting inbound assertions + + + + + The certificate is used as a Tls Client certificate for outbound + tls requests. + + + + + Extension methods for claims. + + + + + Create a Saml2NameIdentifier from a claim. + + Name identifier or Saml2 logout info claim. + Saml2NameIdentifier + The field order is:NameQualifier,SPNameQualifier,Format,SPProvidedID,Value + + + + Extension methods for Claims Identities + + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + In response to id + The destination Uri for the message + Saml2Assertion + + + + + Create a Saml2NameIdentifier from the identity. + + Identity to get NameIdentifier claim from. + Saml2NameIdentifier + + + + Config collection of ArtifactResolutionElements. + + + + + Factory for element type. + + + + + + Get an identifying key of the element. + + Element + Index of endpoint + + + + Generic enumerator. + + Generic enumerator + + + + Configuration of an artifact resolution service endpoint on an idp. + + + + + Index of the artifact resolution service endpoint. + + + + + Location of the endpoint. + + + + + Collection of certificate elements. + + + + + Create a new element of the right type. + + A new certificate element + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Config element for the signing certificate. + + + + + Allows local modification of the configuration for testing purposes + + + + + + File name of cert stored in file. + + + + + Store name to search. + + + + + Store location to search. + + + + + The search term used for searching the certificate store. + + + + + Find type, what field to search. + + + + + Load the certificate pointed to by this configuration. + + Certificate + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Ctor + + + + + Ctor + + Config element to load + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Honor the owin authentication mode even on logout. Normally the logout + handling is always done as if the middleware was active, to allow for + simple sign out without specifying an auth type. + + + + + Do not read the AuthnContext element in Saml2Response. + If you do not need these values to be present as claims in the generated + identity, using this option can prevent XML format errors (IDX13102) + e.g. when value cannot parse as absolute URI + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Handling logout requires access to the authenticated user session. If logout + is done over the POST binding, the session cookie must have SameSite=None + set (which is probably a bad idea). To avoid problems, disable logout + over POST in metadata by default. + + + + + SAML2 Specs says in section 4.4.4.2: + "... The responder MUST authenticate itself to the requester and ensure message integrity, either by signing the message or using a binding-specific mechanism." + + Unfortunately not all IDP seem to follow the specification. Disables requirement for a signed LogoutResponse. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Collection of items with two sources: configured and loaded dyanically. + The dynamically loaded can reset while the configured are kept. + metadata. + + + + + Add a configured key. + + Key to add. + + + + Add a configured certificate. + + Certificate to add. + + + + Set the complete set of loaded items keys. Previously loaded items + are cleared, configured items remain. + + Items to set + + + + The loaded items. + + + + + Gets an enumerator to the combined set of keys. + + Enumerator + + + + Contact person for a SAML2 entity. + + + + + The type of this contact. A value from the + System.IdentityModel.Metadata.ContactType enumeration. + + + + + Name of the company of the contact. + + + + + Given name of the contact. + + + + + Surname of the contact. + + + + + Phone number of the contact. + + + + + E-mail of the contact. + + + + + Config collection of contacts. + + + + + Create a new element of the right type. + + A new ContactPersonElement. + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Converts between string and EntityId, used by the configuration system to + allow configuration properties of type EntityId. + + + + + Converts a string to an EntityId + + Ignored + Ignored + String to convert + EntityID + + + + Config collection of federations. + + + + + Create new elemnt of the right type. + + FederationElement + + + + Get the key of an element, which is the metadata url. + + FedertionElement + + + + + Generic IEnumerable implementation. + + Enumerator + + + + Registers the identity providers from the configured federations in the identity provider dictionary. + + Current options. + + + + Configuration of a federation. + + + + + Location (url, local path or app relative path such as ~/App_Data) + where metadata is located. + + + + + Are unsolicited responses from the idps in the federation allowed? + + + + + Signing certificates for the federation + + + + + Config collection of IdentityProviderElements. + + + + + Create new element of right type. + + IdentityProviderElement + + + + Get the name of an element. + + IdentityProviderElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured identity providers in the dictionary of active idps. + + Current options. + + + + A thread safe wrapper around a dictionary for the identity providers. + + + First I thought about using a ConcurrentDictionary, but that does not maintain + any order of the added objects. Since the first idp added becomes the default idp, + the order must be preserved. And there has to be queuing semantics if the first idp + is dynamically loaded from a federation and later removed. Locks are simple and + this part of the code shouldn't be that performance sensitive. + + + + + Gets an idp from the entity id. + + entity Id to look up. + IdentityProvider + + + + Add an identity provider to the collection.. + + Identity provider to add. + + + + The default identity provider; i.e. the first registered of the currently known. + + + + + Gets all currently known identity providers. Note that the returned + enumeration is a copy to avoid race conditions. + + + + + Try to get the value of an idp with a given entity id. + + Entity id to search for. + The idp, if found. + True if an idp with the given entity id was found. + + + + Checks if there are no known identity providers. + + + + + Removes the idp with the given entity id, if present. If no such + entity is found, nothing is done. + + EntityId of idp to remove. + + + + Config element for the identity provider element. + + + + + Allows local modification of the configuration for testing purposes + + + + + + EntityId as presented by the idp. Used as key to configuration. + + + + + Destination url to send sign in requests to. + + + + + Single logout url endpoint of Idp. + + + + + The binding to use when sending requests to the Idp. + + + + + Certificate location for the certificate the Idp uses to sign its messages. + + + + + Signing algorithm for outbound messages to this Idp. Overrides the + main signature algorithm configured in . + + + + + Allow unsolicited responses. That is InResponseTo is missing in the AuthnRequest. + If true InResponseTo is not required. + If false InResponseTo is required. + Even though AllowUnsolicitedAuthnResponse is true the InResponseTo must be valid if existing. + + + + + Enable automatic downloading of metadata form the well-known uri (i.e. interpret + the EntityID as an uri and download metadata from it). + + + + + Metadata location url to be used for automatic downloading of metadata. + + + + + Artifact Resolution endpoints for the identity provider. + + + + + Does this Idp want the AuthnRequests to be signed? + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Indicates that the IDP sends the return url as part of the RelayState. + This is used when is enabled. + + + + + Root interface for the options objects, handling all configuration of + Saml2. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp list and the notifications. + + + + + Information about known identity providers. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Metadata configuration. + + + + + Used by tests to write-enable config. + + + + + Is the element contents read only? Always true in production, but + can be changed during tests. + + Is the element contents read only? + + + + Information about organization. + + + + + Optional attribute that describes for how long anyone may cache the metadata + presented by the service provider. Defaults to 1 hour. + + + + + How long after generation should the metadata be valid? + + + + + Collection of contacts. + + + + + Requested attributes of the service provider. + + + + + Metadata flag that we want assertions to be signed. + + + + + NamedId policy configuration element. + + + + + Allow create. + + + + + The NameId format. + + + + + Options implementation for handling in memory options. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Reads the options from the current config file. + + Options object. + + + + Creates an options object with the specified SPOptions. + + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Available identity providers. + + + + + Information about the organization responsible for the entity. + + + + + Is this section readonly? + + Is this section readonly? + + + + Name of the organization. + + + + + Display name of the organization. + + + + + Url of the organization. + + + + + The language that should be used for the organization strings. + + + + + Config for a requested element in the SPs metadata. + + + + + Name of the attribute. Usually on the form urn:oid:.... + + + + + Friendly, human readable name of the attribute. + + + + + Format of the Name property, one of the standard Uris in the saml specification. + + + + + Is this attribute required by the SP for it to work correctly? + + + + + Collection of requested attributes that an SP wants in incoming assertions. + + + + + Create a new element of the right type. + + A new RequestedAttributeElement + + + + Get the key of an element. + + Element to get key of. + The name of the requested attribute. + + + + Get a generic enumerator to the collection. + + Generic enumerator + + + + Configuration of RequestedAuthnContext in generated AuthnRequests. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + AuthnContextClassRef. Either a full URL or the last word of a + standard URL. + + + + + Comparison mode of AuthnContextClassRef + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Notification called when a + has been created. The authenticationrequest can be amended and + modified. + + + + + Notification called when the SignIn command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the SignIn command is about to select + what Idp to use for the request. The EntityId is the one supplied + (e.g. through query string). To select a specicic IdentityProvider + simply return it. Return null to fall back to built + in selection. + + + + + Notification called to decide if a SameSite=None attribute should + be set for a cookie. The default implementation is based on the pseudo + code in https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/ + More covering code can be found at + https://www.chromium.org/updates/same-site/incompatible-clients but that cannot + be shipped with the library due to the license. + + + + + Notification called when the logout command is about to use the + StoredRequestState derived from the request's RelayState data. + Return a different StoredRequestState if you would like to customize the + RelayState lookup. + + + + + Notification called when a command is about to construct a fully-qualified url + Return a non-null Uri if you need to override this per request. Otherwise + it will fall back to the normal logic that checks the request Uri + and the SPOptions.PublicOrigin setting + + + + + Notification called when single logout status is returned from IDP. + Return true to indicate that your notification has handled this status. Otherwise + it will fall back to the normal status processing logic. + + + + + Get a binding that can unbind data from the supplied request. The + default is to use + + + + + Notification called when the command has extracted data from + request (by using ) + + + + + Notification called when the ACS command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the Logout command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when a logout request is created to initiate single log + out with an identity provider. + + + + + Notification called when a logout request has been transformed to an XML node tree. + + + + + Notification called when a logout request has been received and processed and a Logout Response has been created. + + + + + Notification called when metadata has been created, but before + signing. At this point the contents of the metadata can be + altered before presented. + + + + + Notification called when the Metadata command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called by the SignIn and Logout commands to validate a ReturnUrl that is not relative. + Return true to indicate that you accept the ReturnUrl, false otherwise. + Default validation do not accept any absolute URL. + When false is returned, the SignIn and Logout commands will throw an . + + + + + Notification called when getting an identity provider. Default version is to return + the given idp from Options.IdentityProviders. + + + + + Callbacks that allow modifying the validation behavior in potentially unsafe/insecure ways + + + + + Callbacks that allow modification of validation behavior in potentially unsafe/insecure ways + + + + + Notification called when the token handler has populated the + . Modify it's properties to customize + the generated validation parameters. + + + + + Notification called when an incoming Saml Response contains an unexpected + InResponseTo value. Return true to acceppt the message despite this. + + This notification has been added to aid in troubleshooting a + hard-to-track-down issue. It will be removed in a future release if a + better solution is identified thanks to the added production analysis + that this enables. + + + + Certificates used by the service provider for signing, decryption and + TLS client certificates for artifact resolve. + + + + + Add a certificate to the collection with default status use and + metadata behaviour. + + Certificate to add. + + + + Add to the collection at the specified position. + + Position index. + Service certificate to add. + + + + Config element for the service certificate element. + + + + + Is this certificate for current or future use? + + + + + Intended use of the certificate + + + + + How should we override the metadata publishing rules? + + + + + Config collection of ServiceCertificateElements. + + + + + Create new element of right type. + + ServiceCertificateElement + + + + Get the name of an element. + + ServiceCertificateElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured service certificates. + + Current options. + + + + Signing behavior for requests. + + + + + Sign authnrequests if the idp is configured for it. This is the + default behavior. + + + + + Always sign AuthnRequests. AuthnRequestsSigned is set to true + in metadata. + + + + + Never sign AuthnRequests. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Ctor + + + + + Construct the options from the given configuration section + + + + + + Return Uri to redirect the client to, if no return uri was specified + when initiating the signin sequence. + + + + + Recommendation of cache refresh interval to those who reads our + metadata. + + + + + Maximum validity duration after fetch for those who reads our + metadata. Exposed as an absolute validUntil time in the metadata. + If set to null, no validUntil is exposed in metadata. + + + + + The security token handler used to process incoming assertions for this SP. + The default value is to lazy create one using the current EntityId. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + Application root relative path for Saml2 endpoints. The + default is "/Saml2". + + + + + By default, the service provider uses the host, protocol, port and + application root path from the HTTP request when creating links. + This might not be accurate in reverse proxy or load-balancing + situations. You can override the origin used for link generation + for the entire application using this property. To override per request, + implement a GetPublicOrigin Notification function. + + + + + Metadata describing the organization responsible for the entity. + + + + + NameId Policy. + + + + + RequestedAuthnContext + + + + + Collection of contacts for the SAML2 entity. + + + + + Collection of attribute consuming services for the service provider. + + + + + Certificates used by the service provider for signing or decryption. + + + + + Certificates valid for use in decryption + + + + + Certificate for use in signing outbound requests + + + + + Certificates to be published in metadata + + + + + Signing behaviour for AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Metadata flag that we want assertions to be signed. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Minimum accepted signature algorithm for any incoming messages. + + + + + Adapter to logging framework of hosting application. + + + + + Template for token validation parameters. Some security critical validation + parameters are set for each use. The Unsafe.TokenValidationParametersCreated notification + is called after those are set if those need to be overriden. + + + + + Config section for the module. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + Current config as read from app/web.config. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + The Url to redirect back to after successfull authentication. + + + + + By default, the service provider uses the host, protocol, and port + from the HTTP request when creating links. This might not be + accurate in reverse proxy or load-balancing situations. You can + override the origin used for link generation using this property. + + + + + Set of identity providers known to the service provider. + + + + + Set of federations. The service provider will trust all the idps in these federations. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + Application root relative path for Saml2 endpoints. The + default is "Saml2". + + + + + NamedId policy element. + + + + + RequestedAuthnContext config. + + + + + Metadata describing the organization responsible for the entity. + + + + + Metadata of the service provider. + + + + + Contacts for the SAML2 entity. + + + + + Attribute consuming services. + + + + + Certificates used by the service provider for signing and/or decryption. + + + + + Signing behavior for created AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Weakest accepted signing algorithm for inbound messages. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Helper methods for DateTime formatting. + + + + + Format a datetime for inclusion in SAML messages. + + Datetime to format. + Formatted value. + + + + A SAML response was found, but could not be parsed due to formatting issues. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Exception thrown when an signature is not valid according to the + SAML standard. + + + + + Default ctor + + + + + Ctor + + Message of exception + + + + Ctor + + Message + Inner exception + + + + Serialization Ctor + + Serialization info + Serialization context + + + + No saml response was found in the http request. + + + + + Default Ctor, setting message to a default. + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Base class for authentication services specific exceptions, that might + require special handling for error reporting to the user. + + + + + Default Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed validation. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed InResponseTo validation because RelayState is lost, or an unsolicited response contains an InResponseTo + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Extended exception containing information about the status and status message SAML response. + + + + + Status of the SAML2Response + + + + + Status message of SAML2Response + + + + + Second level status of SAML2Response + + + + + Ctor, bundling the Saml2 status codes and message into the exception message. + + Exception message. + Status of the SAML2Response + Status message of SAML2Response + Second level status of SAML2Response + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Represents a federation known to this service provider. + + + + + Ctor + + Config to use to initialize the federation. + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + For how long is the metadata that the federation has loaded valid? + Null if there is no limit. + + + + + Signing keys to use to verify the metadata before using it. + + + + + Permitted cache duration for the metadata. + + + + + Valid until + + + + + Represents a known identity provider that this service provider can communicate with. + + + + + Ctor + + Entity id of the identityprovider. + Service provider options to use when + creating AuthnRequests for this Idp. + + + + Should this idp load metadata? The metadata is loaded immediately + when the property is set to true, so the + must be correct before settingLoadMetadata to true. + + + + The binding used when sending AuthnRequests to the identity provider. + + + + + The Url of the single sign on service. This is where the browser is redirected or + where the post data is sent to when sending an AuthnRequest to the idp. + + + + + Artifact resolution endpoints on the idp. + + + + + The Url of the single sign out service. This is where the browser + is redirected or where the post data is sent to when sending a + LogoutRequest to the idp. + + + + + The Url to send single logout responses to. Defaults to + SingleLogoutServiceUrl. + + + + + Binding for the Single logout service. If not set, returns the + same as the main binding (used for AuthnRequests) + + + + + The Entity Id of the identity provider. + + + + + Is this idp allowed to send unsolicited responses, i.e. idp initiated sign in? + + + + + Does the RelayState contains the return url?, + This setting is used only when the AllowUnsolicitedAuthnResponse setting is enabled. + + + + + Location of metadata for the Identity Provider. Automatically enables + . The location can be a URL, an absolute + path to a local file or an app relative path + (e.g. ~/App_Data/IdpMetadata.xml). By default the entity id is + interpreted as the metadata location (which is a convention). + + + + + Create an authenticate request aimed for this idp. + + Urls for Saml2, used to populate fields + in the created AuthnRequest + + + + Signing Algorithm to be used when signing oubound messages. + + + + + Bind a Saml2 message using the active binding of the idp, + producing a CommandResult with the result of the binding. + + + This overload does not support the usage of Xml Created notifications. + + The Saml2 message to bind. + CommandResult with the bound request. + + + + Bind a Saml2 message using the active binding of hte idp, + producing a CommandResult with the result of the binding. + + Type of the message. + The Saml2 message to bind. + Notification to call with Xml structure + CommandResult with the bound message. + + + + The public key of the idp that is used to verify signatures of responses/assertions. + + + + + Reads the supplied metadata and sets all properties of the + IdentityProvider based on the metadata. + + Metadata to read. + + + + Validity time of the metadata this idp was configured from. Null if + idp was not configured from metadata. + + + + + Does this Idp want the AuthnRequests signed? + + + + + Create a logout request to the idp, for the current identity. + + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Interface for an adapter around the logging framework used on each + platform. + + + + + Write informational message. + + Message to write. + + + + Write an error message + + Message + Exception to include in error message. + + + + Write an informational message on the verbose level. + + Message to write + + + + SymmetricAlgorithm decrypting implementation for http://www.w3.org/2009/xmlenc11#aes128-gcm. + This is class is not a general implementation and can only do decryption. + + + + + A WebClient implementation that will add a list of client + certificates to the requests it makes. + + + + + Register the certificate to be used for this requets. + + Certificates to offer to server + + + + Override the base class to add the certificate + to the reuqest before returning it. + + + + + + + Helpers for delimited string, with support for escaping the delimiter + character. + + + + + Join strings with a delimiter and escape any occurence of the + delimiter and the escape character in the string. + + Strings to join + Joined string + + + + Split strings delimited strings, respecting if the delimiter + characters is escaped. + + Joined string from + Unescaped, split strings + + + + Class to help with mapping virtual paths relative to the server. + + + + + Returns the base path of the website or application running. + + + + + Maps a virtual path to the BasePath of the running appliction. + + The virtual path that needs to mapped relative to the server. + A file path. + + + + Determines if a virtual path is relative or not. + + The path that is to be tested. + True if the path is relative otherwise false. + + + + Determines if a url is relative to current host, excluding protocol-relative addresses + + The path that is to be tested. + True if the url is relative otherwise false. + + + + Class implements static methods to help parse a query string. + + + + + Splits a query string into its key/value pairs. + + A query string, with or without the leading '?' character. + A collecktion with the parsed keys and values. + + + + AES-GCM Nonce size defined in https://www.w3.org/TR/xmlenc-core1/#sec-AES-GCM + + + + + Crypto description for a Managed implementation of SHA256 signatures. + + + + + Ctor + + + + + Create a deformatter + + Key + Deformatter + + + + Create a formatter + + Key + Formatter + + + + How should we override the metadata publishing rules + + + + + No override. Published according to the normal rules. + + + + + Publish as Unspecified + + + + + Publish as Encryption + + + + + Publish as Signing + + + + + Do not publish + + + + + Metadata for an attribute consuming service. + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Is the service required? + + + + + The name of the attribute consuming service. + + + + + Description of the attribute consuming service + + + + + Requested attributes. + + + + + Use this instance for reading metadata. It uses custom extensions + to increase feature support when reading metadata. + + + + + An indexed entry with an optional default + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + A collection of indexed entries with support for getting the + configured default entry + + The type stored in the collection + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Extensions for Metadatabase. + + + + + Use a MetadataSerializer to create an XML string out of metadata. + + Metadata to serialize. + Certificate to sign the metadata + with. Supply null to not sign. + Algorithm to use when signing. + + + + Helper for loading SAML2 metadata + + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + EntityDescriptor containing metadata + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + If the metadata contains + an EntitiesDescriptor, try to unpack it and return a single + EntityDescriptor inside if there is one. + EntityDescriptor containing metadata + + + + Load and parse metadata for a federation. + + Url to metadata + Extended entitiesdescriptor + + + + Load and parse metadata for a federation. + + Url to metadata + + Validate the certificate when doing + signature validation. Normally a bad idea with SAML2 as certificates + are not required to be valid but are only used as conventient carriers + for keys. + Mininum strength accepted + for signing algorithm. + Extended entitiesdescriptor + + + + Specifies an attribute requested by the service provider. + + + + + Ctor + + Name of the attribute. + + + + Ctor + + Name of the attribute. + Value of the attribute. + + + + Is this attribute required by the service provider? + + + + + Uri used for NameFormat to specify that the Name is a Uri. + + + + + Uri used for NameFormat to specify that the format of the Name + is unspecified. + + + + + Uri used for NameFormat to specify that the format of the Name + fulfills the standard's basic requirements. + + + + + Extensions for NameIdFormat enum. + + + + + Get the full Uri for a NameIdFormat. + + NameIdFormat to get Uri for + Uri + + + + Logger adapter that does nothing. + + + + + Write an error message + + Message + Exception to include in error message. + + + + Write informational message. + + Message to write. + + + + Write an informational message on the verbose level. + + Message to write + + + + Generator of secure random keys.. + + + + + Create a unique random string with a cryptographically secure + random function. + + Random string 56-chars string + + + + Create a unique random array with a cryptographically secure + random function. + + 20 random bytes. + + + + Simple default implementation of detection of browsers/devices not compatible with + the SameSite=None cookie attribute. + Based on https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1 + + + + + Should a SameSite=None cookie attribute be emitted? + + User Agent string + True if SameSite=None should be emitted. + + + + Extension methods for Saml2Assertion + + + + + Writes out the assertion as an XElement. + + The assertion to create xml for. + XElement + + + + Claim type constants. + + + + + Session index is set by the idp and is used to correlate sessions + during single logout. + + + + + Original subject name identifier from the SAML2 idp, that should + be logged out as part of a single logout scenario. + + + + + Extension methods for Saml2Condition + + + + + Writes out the conditions as an XElement. + + Conditions to create xml for. + XElement + + + + Extension methods for Saml2NameId + + + + + Create XElement for the Saml2NameIdentifier. + + + + + + + SAML2 namespace constants. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace Uri of Saml2 protocol. + + + + + Namespace of SAML2 assertions. + + + + + Namespace of SAML2 assertions. + + + + + Namespace Uri of SAML2 assertions. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for Xml schema instance. + + + + + Namespace for Soap envelope. + + + + + Namespace for Soap envelope. + + + + + Comparison setting for RequestedAuthnContext, see SAML2 Core spec 3.3.2.2.1. + + + + + Exact match is required. This is the default. + + + + + The resulting AuthnContext must be at least as strong as the + specified classRef. + + + + + The resulting AuthnContext must be at most as strong as the + specified classRef. + + + + + The resulting AuthnContext must be better than the specified + classRef. The classRef specified is thus not permitted. + + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Common properties of all Saml2 message implementations (both requests + and responses). There is no corresponding definition in the SAML2 + standard, so this is made up of the common fields of 3.2.2 Complex Type + StatusResponseType (the base type for all responses) and of 3.2.1 Complex + Type RequestAbstractType. + + + + + The destination of the message. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Issuer of the message. + + + + + Serializes the message into wellformed XML. + + Saml2 message to transform to XML + Notification allowing modification of XML tree before serialization. + string containing the Xml data. + + + + The NameId Format. + + + + + No NameId format has been configured. No format will be included + in AuthnRequests and metadata. + + + + + 8.3.1 Unspecified + + + + + 8.3.2 Email Address + + + + + 8.3.3 X.509 Subject Name + + + + + 8.3.4 Windows Domain Qualified Name + + + + + 8.3.5 Kerberos Principal Name + + + + + 8.3.6 Entity Identifier + + + + + 8.3.7 Persistent Identifier + + + + + 8.3.8 Transient Identifier + + + + + Artifact resolution request, corresponds to section 3.5.1 in SAML + core specification. + + + + + Artifact to resolve. + + + + + The SAML2 request name + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 ArtifactResponse message as specified in SAML2 Core 3.5.2. + + + + + Ctor + + Parsed XML with message. + + + + Contained message. + + + + + Status code of the Artifact response. + + + + + An authentication request corresponding to section 3.4.1 in SAML Core specification. + + + + + Default constructor + + + + + The SAML2 request name + + + + + Serializes the request to a Xml message. + + XElement + + + + Serializes the message into wellformed Xml + + string containing the Xml data. + + + + Read the supplied Xml and parse it into a authenticationrequest. + + xml data. + Relay State attached to the message or null if not present. + Saml2Request + On xml errors or unexpected xml structure. + + + + Ctor + + Xml data + RelayState associateed with the message. + + + + The assertion consumer url that the idp should send its response back to. + + + + + Index to the SP metadata where the list of requested attributes is found. + + + + + Scoping for request + + + + + NameId policy. + + + + + RequestedAuthnContext. + + + + + Binding type to request the Idp to use when responding. + + + + + Sets whether request should force the idp to authenticate the presenter directly, + rather than rely on a previous security context. + If false, the ForceAuthn parameter is omitted from the request. + If true, the request is sent with ForceAuthn="true". + + + + + Sets whether request should request for SAML Passive login if possible, + If false, the IsPassive parameter is omitted from the request. + If true, the request is sent with IsPassive="true". + + + + + The Saml2IdPEntry specifies a single identity provider trusted by the + requester to authenticate the presenter + + + + + Initializes a new instance of the class. + + The provider identifier. + + + + A URI reference representing the location of a profile-specific + endpoint supporting the authentication request protocol. The + binding to be used must be understood from the profile of use. + + + + + A human-readable name for the identity provider. + + + + + The Entity Id of the Identity Provider. Cannot be null. + + + + + Create XElement for the Saml2IdPEntry. + + + + + A Saml2 LogoutRequest message (SAML core spec 3.7.1) + + + + + Ctor + + + + + Ctor + + Id of message. + + + + Create Saml2LogoutRequest from data in Xml. + + Xml data to initialize the Saml2LogoutRequest from. + + + + The SAML2 request name + + + + + Name id to logout. + + + + + Session index to logout. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 Logout Response. + + + + + Ctor + + Status of the response. + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Appends xml for the Saml2LogoutResponse to the given parent node. + + Xml for the Saml2LogoutResponse is appended + to the children of this node. + + + + Load values into Saml2LogoutResponse from passed xml element + + XmlElement containing a LogoutResponse + Saml2LogoutResponse + + + + The NameId policy. + + The class is used in created AuthnRequests, so it is + immutable to avoid unintended changes. + + + + Ctor + + + + + + + Value of AllowCreate attribute. Set to null to omit. + + + + + The NameId format. + + + + + Somewhat ugly subclassing to be able to access some methods that are protected + on Saml2SecurityTokenHandler. The public interface of Saml2SecurityTokenHandler + expects the actual assertion to be signed, which is not always the case when + using Saml2-P. The assertion can be embedded in a signed response. Or the signing + could be handled at transport level. + + + + + Process authentication statement from SAML assertion. WIF chokes if the authentication statement + contains a DeclarationReference, so we clear this out before calling the base method + http://referencesource.microsoft.com/#System.IdentityModel/System/IdentityModel/Tokens/Saml2SecurityTokenHandler.cs,1970 + + Authentication statement + Claim subject + Assertion Issuer + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Base class for saml requests, corresponds to section 3.2.1 in SAML Core specification. + + + + + The id of the request. + + + + + Version of the SAML request. Always returns "2.0" + + + + + The instant that the request was issued (well actually, created). + + + + + SAML message name for requests - hard coded to SAMLRequest. + + + + + The destination of the request. + + + + + The issuer of the request. + + + + + The additional content to append within an Extensions element. + + + + + The SAML2 request name + + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Creates XNodes for the fields of the Saml2RequestBase class. These + nodes should be added when creating XML out of derived classes. + + + + + + Reads the request properties present in Saml2RequestBase + Also validates basic properties of the request + + The xml document to parse + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + RelayState attached to the message. + + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Configuration of RequestedAuthnContext + + + + + Ctor + + Config element to load. + + + + Ctor + + AuthnContextClassRef + Comparison + + + + Authentication context class reference. + + + + + Comparison method. + + + + + Represents a SAML2 response according to 3.3.3. The class is immutable (to an + external observer. Internal state is lazy initiated). + + + + Holds all assertion element nodes + + + + Read the supplied Xml and parse it into a response. + + xml data. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + Saml2Response + On xml errors or unexpected xml structure. + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + Audience of the response, set as AudienceRestriction + response. Each identity is translated into a separate assertion. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + The response as an xml element. Either the original xml, or xml that is + generated from supplied data. + + + + + Transforms the message to an XElement object tree. + + This operation is inefficient, but it is only used by + the StubIdp so it's acceptable. + XElement with Xml representation of the message + + + + SAML Message name for responses, hard coded to SAMLResponse. + + + + + string representation of the Saml2Response serialized to xml. + + string containing xml. + + + + Id of the response message. + + + + + Expected InResponseTo as extracted from + + + + + InResponseTo id. + + + + + Issue instant of the response message. + + + + + Status code of the message according to the SAML2 spec section 3.2.2.2 + + + + + StatusMessage of the message according to the SAML2 spec section 3.2.2.1 + + + + + Optional status which MAY give additional information about the cause of the problem (according to the SAML2 spec section 3.2.2.2))))))))). + Because it may change in future specifications let's not make enum out of it yet. + + + + + Issuer (= sender) of the response. + + + + + The destination of the response message. + + + + Gets all assertion element nodes from this response message. + All assertion element nodes. + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + ClaimsIdentities + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + Relay data stored when creating AuthnRequest, to be passed on to + GetIdentityProvider notification. + ClaimsIdentities + + + + RelayState attached to the message. + + + + + Session termination time for a session generated from this + response. + + + + + Saml2Scoping specifies a set of identity providers trusted by the + requester to authenticate the presenter, as well as limitations and + context related to proxying of the authentication request message to + subsequent identity providers by the responder. + + + + + Gets advisory list of identity providers and associated information + that the requester deems acceptable to respond to the request. + + + + + Fluent config helper that adds a to the + + + Idp entry to add + this + + + + Specifies the number of proxying indirections permissible between + the identity provider that receives the authentication request and + the identity provider who ultimately authenticates the principal. + A count of zero permits no proxying, while omitting (null) this + attribute expresses no such restriction. + + + + + Gets or sets the set of requesting entities on whose behalf the + requester is acting. Used to communicate the chain of requesters + when proxying occurs. + + + + + Fluent config helper that adds a requester id to the + + + Requester Id to add + this + + + + Create XElement for the Saml2Scoping. + + + + + Saml2 Soap binding implementation. + + + This class does not follow the pattern of the other three bindings + (Redirect, POST and Artifact) because it does not use the front channel + with messages being passed over the user's browser. + + + + + Create a SOAP body around a specified payload. + + Payload of the message. + + + + + Extract the body of a SOAP message. + + xml data + Parsed data. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Response. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Client certificates to offer to the server. + Response. + + + + Status codes, mapped against states in section 3.2.2.2 in the SAML2 spec. + + + + + Success. + + + + + Error because of the requester. + + + + + Error because of the responder. + + + + + Versions doesn't match. + + + + + The responding provider was unable to successfully authenticate the principal + + + + + Unexpected or invalid content was encountered within a saml:Attribute or saml:AttributeValue element. + + + + + The responding provider cannot or will not support the requested name identifier policy. + + + + + The specified authentication context requirements cannot be met by the responder. + + + + + Used by an intermediary to indicate that none of the supported identity provider Loc elements in + an IDPList can be resolved or that none of the supported identity providers are available. + + + + + Indicates the responding provider cannot authenticate the principal passively, as has been requested. + + + + + Used by an intermediary to indicate that none of the identity providers in an IDPList are supported by the intermediary. + + + + + Used by a session authority to indicate to a session participant that it was not able to propagate logout to all other session participants. + + + + + Indicates that a responding provider cannot authenticate the principal directly and is not permitted to proxy the request further. + + + + + The SAML responder or SAML authority is able to process the request but has chosen not to + respond. This status code MAY be used when there is concern about the security context of the + request message or the sequence of request messages received from a particular requester. + + + + + The SAML responder or SAML authority does not support the request. + + + + + The SAML responder cannot process any requests with the protocol version specified in the request. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is a major upgrade from the highest protocol version supported by the responder. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is too low. + + + + + The resource value provided in the request message is invalid or unrecognized. + + + + + The response message would contain more elements than the SAML responder is able to return. + + + + + An entity that has no knowledge of a particular attribute profile has been presented with an attribute + drawn from that profile. + + + + + The responding provider does not recognize the principal specified or implied by the request. + + + + + The SAML responder cannot properly fulfill the request using the protocol binding specified in the + request. + + + + + Abstract Saml2 StatusResponseType class. + + + + + Ctor + + Status of the response + + + + The destination of the message. + + + + + Issuer of the message. + + + + + Id of request message, if this message is a response to a previous + request. + + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Status code of the message. + + + + + Id of the message. + + + + + Issue instant. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Extension methods for Saml2Statement + + + + + Writes out the statement as an XElement. + + Statement to create xml for. + XElement + + + + Extension methods for Saml2Subject + + + + + Writes out the subject as an XElement. + + The subject to create xml for. + XElement + + + + Writes out the subject confirmation as an XElement. + + + + + + + + Writes out the subject confirmation data as an XElement. + + + + + + + + Service Certificate definition + + + + + Ctor + + + + + Ctor for loading from configuration + + + + + + X509 Certificate + + + + + Is this certificate for current or future use? + + + + + What is the intended use of this certificate. + + + + + How should we override the metadata publishing rules? + + + + + Stored data for pending requests. + + + + + Start of the cookie name for state preservation. + + + + + Ctor + + The EntityId of the IDP the request was sent to + The Url to redirect back to after a succesful login + ID of the SAML message, used to match InResponseTo + Aux data that can be stored across the authentication request. + + + + The IDP the request was sent to + + + + + The Url to redirect back to after a succesful login + + + + + Message id of the originating Saml message. Should match InResponseTo + in the response. + + + + + Aux data that need to be preserved across the authentication call. + + + + + Get a serialized representation of the data. + + Serialized data + + + + Ctor that restores a StoredRequestState object from serialized + representation. + + data buffer + + + + The level of trust that a certain piece of data comes with. + + + + + The data cannot be trusted at all. + + + + + The data was retreived through a request that was initiated from + our end, but there was no transport protection. + + + + + The data was retrevied through TLS protected request that was + initaited from our end, to a host that had a valid TLS certificate. + + + + + The data was signed and have been verified by a signing key. + + + + + Data is from a local configuration source. E.g. metadata or a + certificate loaded from disk. + + + + + Represents the assertion consumer service command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.AcsCommandName). + + + + + Run the command, initiating or handling the assertion consumer sequence. + + Request data. + Options + CommandResult + + + + Reimplementation of System.Web.HttpCacheability. + + + + + Value is not initialized and probably a mistake. + + + + + Sets the Cache-Control: no-cache header. + + + + + The default value. Sets the cache control to "private". + + + + + Specifies that the response is cached only at the origin server. + + + + + Will disallow anyone but the server to cache the result. + + + + + Sets the Cache-Control to public. + + + + + The response is cached in the client and the server but nowhere else. + + + + + Factory to create the command objects thand handles the incoming http requests. + + + + + The name of the Assertion Consumer Service Command. + + + + + The name of the Sign In Command. + + + + + The name of the Log Out Command. + + + + + The metadata command has no name - it is triggered at base url for + Saml2. + + + + + Gets a command for a command name. + + Name of a command. Probably a path. A + leading slash in the command name is ignored. + A command implementation or notFoundCommand if invalid. + + + + The results of a command. + + + + + Status code that should be returned. + + + + + Cacheability of the command result. + + + + + Location, if the status code is a redirect. + + + + + The extracted principal if the command has parsed an incoming assertion. + + + + + Session termination time. Priority order: 1. SessionNotOnOrAfter in + assertion. 2. WIF configured lifetime with SessionSecurityTokenHandler + 3. SessionSecurityTokenHandler default. + + + + + The response body that is the result of the command. + + + + + The Mime-type + + + + + Data relayed from a previous request, such as the dictionary storing + the Owin Authentication Properties. + + + + + Indicates that the local session should be terminated. Used by + logout functionality. + + + + + Name of cookie to set. + + + + + Value of the "Secure" flag for the cookie (relevant if != null). + + + + + SAML RelayState value + + + + + Request state to store so that it is available on next http request. + + + + + Serialized request state. + + + + + Name of cookie to be cleared. + + + + + Ctor + + + + + Can be set by a notification callback to indicate that the + has been handled and should not + be applied by the Saml2 library to the response. + + + + + Other headers that should be set on the response. + + + + + The data of a http request that Saml2 needs to handle. A separate DTO is used + to make the core library totally independent of the hosting environment. + + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Function that reads cookie if it exists + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Escape a Base 64 encoded cookie value, matching the unescaping + that is done in the ctor. + + Data to escape + Escaped data + + + + The http method of the request. + + + + + The complete Url of the request. + + + + + The form data associated with the request (if any). + + + + + The query string parameters of the request. + + + + + The root Url of the application. This includes the virtual directory + that the application is installed in, e.g. http://hosting.example.com/myapp/ + + + + + RelayState from SAML message + + + + + Request state from a previous call, carried over through cookie. + + + + + User (if any) associated with the request + + + + + A command - corresponds to an action in Mvc. + + + + + Run the command and return a result. + + The http request that the input + data can be read from. + The options to use when performing the command. + The results of the command, as a DTO. + + + + Represents the logout command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.LogoutCommandName). + + + + + Run the command, initiating or handling the logout sequence. + + Request data. + Options + CommandResult + + + + Run the command, initating or handling the logout sequence. + + Request data. + Path to return to, only used if this + is the start of an SP-initiated logout. + Options + CommandResult + + + + Initiatiate a federated logout. + + Request data + Return url to redirect to after logout + optins + Terminate local session as part of signout? + + + + + Represents the service provider metadata command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.MetadataCommandName). + + + + + Run the command, creating and returning the service provider metadata. + + Request data. + Options + CommandResult + + + + Represents a missing command. + Instances of this class are returned by CommandFactory.GetCommand(...) + when the specified command name is not recognised. + + + + + Run the command, returning a CommandResult specifying an HTTP 404 Not Found status code. + + Request data. + Options + CommandResult + + + + Saml2 Artifact binding. + + + + + + + + + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + Options used to look up details of issuing + idp when needed (artifact binding). + True if the binding supports the current request. + + + + Create a SAML artifact value. + + Entity id of the artifact issuer. + Index of the artifact resolution endpoint + that the requester should use to resolve the artifact. + + + + Binds a message to a http response with HTTP Redirect. + + Message to bind. + Logger to use. + CommandResult. + + + + Pending messages where the artifact has been sent. + + + + + The result of a Saml2Binding.UnBind. + + + + + Ctor + + The data payload + The associated relay state. + Level of trust that can be put in data. + Does not care about any signature included in the data. + + + + The data payload. + + + + + The associated relay state, if any. Otherwise null. + + + + + Trust level indicating how much the message contents can be + trusted. + + + + + Abstract base for all Saml2Bindings that binds a message to a specific + kind of transport. + + + + + Uri identifier of the HTTP-POST binding. + + + + + Uri identifier of the HTTP-Redirect binding. + + + + + Uri identifier of the HTTP-Artifact binding. + + + + + Uri identifier of the Discovery Response SAML extension. + + + + + Uri identifier of the SOAP binding. + + + + + Binds a message to a http response. + + Message to bind. + Logger to log use, can be null. + CommandResult. + + + + Binds a message to an http response. + + Type of the message. + Message to bind + Logger to log use, can be null. + Notification to call for modification of XDocument, can be null. + CommandResult. + + + + Binds a message to a http response. + + Message to bind. + CommandResult. + + + + Extracts a message out of the current HttpRequest. + + Current HttpRequest. + Options, used to look up certificate information + in bindings that validate signatures. If set to null, the returned + result will have TrustLevel.None. + Extracted message. + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + True if the binding supports the current request. + + + + Get a cached binding instance that supports the requested type. + + Type of binding to get + A derived class instance that supports the requested binding. + + + + Get a cached binding instance that can handle the current request. + + Current HttpRequest + A derived class instance that supports the requested binding, + or null if no binding supports the current request. + + + + Gets the Saml2BindingType enum value for a Saml2Binding type uri, where the + uri should be one specified in the standard. + + Uri for the binding. + Binding type enum value. + If the uri doesn't correspond to a known binding. + + + + Gets the Uri for a Saml2BindingType. + + Saml2BindingType + Uri constant for the speicified Binding Type + If the type is not mapped. + + + + Saml2 binding types. + + + + + The http redirect binding according to saml bindings section 3.4 + + + + + The http post binding according to saml bindings section 3.5 + + + + + The artifact resolution binding according to bindings section 3.6 + + + + + The urls of Saml2 that are used in various messages. + + + + + Resolve the urls for Saml2 from an http request and options. + + Request to get application root url from. + Options to get module path and (optional) notification hooks from. + + + + Creates the urls for Saml2 based on the complete base Url + the application and the Saml2 base module path. + + The full Url to the root of the application. + Path of module, starting with / and ending without. + + + + Creates the urls for Saml2 based on the given full urls + for assertion consumer service and sign-in + + The full Url for the Assertion Consumer Service. + The full Url for sign-in. + The full Url for the application root. + + + + The full url of the assertion consumer service. + + + + + The full url of the signin command, which is also the response + location for idp discovery. + + + + + The full url of the application root. Used as default redirect + location after logout. + + + + + The full url of the logout command. + + + + + Represents the sign in command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.SignInCommandName). + + + + + Run the command, initiating the sign in sequence. + + Request data. + Options + CommandResult + + + + Initiate the sign in sequence. + + Entity id of idp to sign in to, or + null to use default (discovery service if configured) + Path to redirect to when the sign in + is complete. + The incoming http request. + Options. + Data to store and make available when the + ACS command has processed the response. + Command Result + + + + Extension methods and helpers for XmlDocument/XmlElement etc. + + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + + + + Creates an Xml document with secure settings and initialized it from + a string. + + Source string to load + Xml document + + + + Create an Xml Document with secure settings, specifically + disabling xml external entities. Also set PreserveWhiteSpace = true + + Xml Document + + + + Remove the attribute with the given name from the collection. + + Attribute collection. + Name of attribute to remove. + + + + Remove the child xml element with the specified name. + + Parent + Name of child + Namespace of child + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + Uri of signing algorithm to use. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + The signing algorithm to use. + + + + Checks if an xml element is signed by the given certificate, through + a contained enveloped signature. + + Xml Element that should be signed + Signing keys to test, one should validate. + Should the certificate be validated too? + The mininum signing algorithm + strength allowed. + True on correct signature, false on missing signature + If the data has + been tampered with or is not valid according to the SAML spec. + + + + Workaround for a bug in Reference.LoadXml incorrectly counting index + of signature from the start of the document, not from the start of + the element. Reported to Microsoft at + https://connect.microsoft.com/VisualStudio/feedback/details/2288620 + + SignedXml + Signature element. + + + + Check if the signature method is at least as strong as the mininum one. + + + + If the signaturemethod is too weak. + + + + Pretty an xml element. + + Xml to pretty print. + Nicely indented and readable data. + + + + Store a list of signing algorithms that are available in SignedXml. + This needs to be done through reflection, to keep the library + targetting lowest supported .NET version, while still getting + access to new algorithms if the hosting application targets a + later version. + + + + diff --git a/Bin/System.Configuration.ConfigurationManager.dll b/Bin/System.Configuration.ConfigurationManager.dll new file mode 100644 index 0000000..58530a4 Binary files /dev/null and b/Bin/System.Configuration.ConfigurationManager.dll differ diff --git a/Bin/System.Configuration.ConfigurationManager.dll.refresh b/Bin/System.Configuration.ConfigurationManager.dll.refresh new file mode 100644 index 0000000..96417a0 Binary files /dev/null and b/Bin/System.Configuration.ConfigurationManager.dll.refresh differ diff --git a/Bin/System.Security.AccessControl.dll b/Bin/System.Security.AccessControl.dll new file mode 100644 index 0000000..752972c Binary files /dev/null and b/Bin/System.Security.AccessControl.dll differ diff --git a/Bin/System.Security.AccessControl.dll.refresh b/Bin/System.Security.AccessControl.dll.refresh new file mode 100644 index 0000000..7e4513d Binary files /dev/null and b/Bin/System.Security.AccessControl.dll.refresh differ diff --git a/Bin/System.Security.AccessControl.xml b/Bin/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/Bin/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/Bin/System.Security.Cryptography.Xml.dll b/Bin/System.Security.Cryptography.Xml.dll new file mode 100644 index 0000000..efa6a1d Binary files /dev/null and b/Bin/System.Security.Cryptography.Xml.dll differ diff --git a/Bin/System.Security.Cryptography.Xml.dll.refresh b/Bin/System.Security.Cryptography.Xml.dll.refresh new file mode 100644 index 0000000..a990667 Binary files /dev/null and b/Bin/System.Security.Cryptography.Xml.dll.refresh differ diff --git a/Bin/System.Security.Cryptography.Xml.xml b/Bin/System.Security.Cryptography.Xml.xml new file mode 100644 index 0000000..68b67a4 --- /dev/null +++ b/Bin/System.Security.Cryptography.Xml.xml @@ -0,0 +1,2060 @@ + + + + System.Security.Cryptography.Xml + + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using a byte array as the value. + The encrypted data to use for the element. + The parameter is . + The property has already been set. + + + Initializes a new instance of the class using a object. + The object to use. + The parameter is . + The property has already been set. + + + Gets or sets the element. + A object. + The property was set to . + The property was set more than once. + + + Gets or sets the element. + A byte array that represents the element. + The property was set to . + The property was set more than once. + + + Gets the XML values for the object. + A object that represents the XML information for the object. + The property and the property are . + + + Loads XML data from an into a object. + An that represents the XML data to load. + The parameter is . + The property and the property are . + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) pointing to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain information. + A Uniform Resource Identifier (URI) pointing to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Returns the XML representation of a object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object that represents an XML element to use as the reference. + The provided is . + + + Represents the object element of an XML signature that holds data to be signed. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified identification, MIME type, encoding, and data. + The identification to initialize the new instance of with. + The MIME type of the data used to initialize the new instance of . + The encoding of the data used to initialize the new instance of . + The data to initialize the new instance of with. + The parameter is . + + + Gets or sets the data value of the current object. + The data of the current . + The value used to set the property is . + + + Gets or sets the encoding of the current object. + The type of encoding of the current object. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the identification of the current object. + The name of the element that contains data to be used. + + + Loads a state from an XML element. + The XML element to load the state from. + The value from the XML element is . + + + Gets or sets the MIME type of the current object. + The MIME type of the current object. The default is . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Represents the private key of the element. + + + Initializes a new instance of the class with a new, randomly-generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of the class that holds the public key. + + + Returns the XML representation of a element. + The XML representation of the element. + + + Gets or sets the key value represented by a object. + The public key represented by a object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter is not a valid XML element. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use for the element. + The provided is . + The parameter does not contain a <> node. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a element to the element. + A object to add to the property. + + + Adds a element to the element. + A object to add to the property. + + + Gets or sets the optional element in XML encryption. + A string that represents a name for the key value. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads the specified XML information into the element in XML encryption. + An representing an XML element to use for the element. + The parameter is . + The parameter does not contain a element. + + + Gets or sets the optional attribute in XML encryption. + A string representing the value of the attribute. + + + Gets or sets the element in XML encryption. + A object. + + + Represents the abstract base class used in XML encryption from which the , , and classes derive. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that points to the data to encrypt. + The parameter is . + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain. + The Uniform Resource Identifier (URI) that points to the data to encrypt. + A object that describes transforms to be done on the data to encrypt. + The parameter is . + + + Adds a object to the current transform chain of an object. + A object to add to the transform chain. + + + Gets a value that indicates whether the cache is valid. + + if the cache is valid; otherwise, . + + + Returns the XML representation of an object. + An object that represents the values of the element in XML encryption. + The property is . + + + Loads an XML element into an object. + An object that represents an XML element. + The parameter is . + + + Gets or sets a reference type. + The reference type of the encrypted data. + + + Gets or sets the transform chain of an object. + A object that describes transforms used on the encrypted data. + + + Gets or sets the Uniform Resource Identifier (URI) of an object. + The Uniform Resource Identifier (URI) of the object. + The property was set to . + + + Represents the abstract base class from which the classes and derive. + + + Initializes a new instance of the class. + + + Adds an child element to the element in the current object in XML encryption. + An object. + + + Gets or sets the value for an instance of an class. + A object. + The property was set to . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the encoding of the encrypted data. + + + Gets or sets the element for XML encryption. + An object that represents the element. + + + Gets or sets the element in XML encryption. + An object. + + + Returns the XML representation of the object. + An object that represents the element in XML encryption. + + + Gets or sets the attribute of an instance in XML encryption. + A string of the attribute of the element. + + + Gets of sets the element in XML encryption. + A object. + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use in the element. + The provided is . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the media type of the encrypted data. + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the text form of the encrypted data. + + + Represents the process model for implementing XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified XML document. + An object used to initialize the object. + + + Initializes a new instance of the class using the specified XML document and evidence. + An object used to initialize the object. + An object associated with the object. + + + Defines a mapping between a key name and a symmetric key or an asymmetric key. + The name to map to . + The symmetric key to map to . + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not an RSA algorithm or a symmetric key. + + + Resets all key name mapping. + + + Decrypts an element using the specified symmetric algorithm. + The data to decrypt. + The symmetric key used to decrypt . + A byte array that contains the raw decrypted plain text. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts all elements of the XML document that were specified during initialization of the class. + The cryptographic key used to decrypt the document was not found. + + + Determines the key represented by the element. + The object that contains the key to retrieve. + A byte array that contains the key. + The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Decrypts an element using an asymmetric algorithm. + An array of bytes that represents an encrypted element. + The asymmetric key used to decrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts an element using a symmetric algorithm. + An array of bytes that represents an encrypted element. + The symmetric key used to decrypt . + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the element is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Gets or sets the evidence of the object from which the object is constructed. + An object. + + + Gets or sets the encoding used for XML encryption. + An object. + + + Encrypts the outer XML of an element using the specified X.509 certificate. + The XML element to encrypt. + The X.509 certificate to use for encryption. + An element that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not represent an RSA key algorithm. + + + Encrypts the outer XML of an element using the specified key in the key mapping table. + The XML element to encrypt. + A key name that can be found in the key mapping table. + An object that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not match a registered key name pair. +-or- +The cryptographic key described by the parameter is not supported. + + + Encrypts data in the specified byte array using the specified symmetric algorithm. + The data to encrypt. + The symmetric algorithm to use for encryption. + A byte array of encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + The data could not be encrypted using the specified parameters. + + + Encrypts the specified element or its contents using the specified symmetric algorithm. + The element or its contents to encrypt. + The symmetric algorithm to use for encryption. + + to encrypt only the contents of the element; to encrypt the entire element. + A byte array that contains the encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts the key that a recipient uses to decrypt an element. + The key to encrypt. + The asymmetric key used to encrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts a key using a symmetric algorithm that a recipient uses to decrypt an element. + The key to encrypt. + The symmetric key used to encrypt . + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Retrieves the decryption initialization vector (IV) from an object. + The object that contains the initialization vector (IV) to retrieve. + The Uniform Resource Identifier (URI) that describes the cryptographic algorithm associated with the value. + A byte array that contains the decryption initialization vector (IV). + The value of the parameter is . + The value of the parameter has an property that is null. +-or- +The value of the parameter is not a supported algorithm. + + + Retrieves the decryption key from the specified object. + The object that contains the decryption key to retrieve. + The size of the decryption key to retrieve. + A object associated with the decryption key. + The value of the parameter is . + The encryptedData parameter has an property that is null. +-or- +The encrypted key cannot be retrieved using the specified parameters. + + + Determines how to resolve internal Uniform Resource Identifier (URI) references. + An object that contains an element with an ID value. + A string that represents the ID value. + An object that contains an ID indicating how internal Uniform Resource Identifiers (URIs) are to be resolved. + + + Gets or sets the cipher mode used for XML encryption. + One of the values. + + + Gets or sets the padding mode used for XML encryption. + One of the values that specifies the type of padding used for encryption. + + + Gets or sets the recipient of the encrypted key information. + The recipient of the encrypted key information. + + + Replaces an element with a specified decrypted sequence of bytes. + The element to replace. + The decrypted data to replace with. + The value of the parameter is . +-or- +The value of the parameter is . + + + Replaces the specified element with the specified object. + The element to replace with an element. + The object to replace the parameter with. + + to replace only the contents of the element; to replace the entire element. + The value of the parameter is . +-or- +The value of the parameter is . + + + Gets or sets the object used by the Document Object Model (DOM) to resolve external XML references. + An object. + + + Gets or sets the XML digital signature recursion depth to prevent infinite recursion and stack overflow. This might happen if the digital signature XML contains the URI which then points back to the original XML. + Returns . + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Digital Encryption Standard (DES) algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption element content. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for an XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption syntax and processing. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Public Key Cryptography Standard (PKCS) Version 1.5 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Optimal Asymmetric Encryption Padding (OAEP) encryption algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-256 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-512 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the TRIPLEDES key wrap algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Triple DES algorithm. This field is constant. + + + Encapsulates the encryption algorithm used for XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying an algorithm Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that describes the algorithm represented by an instance of the class. + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets or sets a Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + A Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + + + Gets or sets the algorithm key size used for XML encryption. + The algorithm key size, in bits, used for XML encryption. + The property was set to a value that was less than 0. + + + Parses the specified object and configures the internal state of the object to match. + An object to parse. + The parameter is . + The key size expressed in the parameter was less than 0. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object to use for initialization. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets the ID of the current object. + The ID of the current object. + + + Parses the input and configures the internal state of the object to match. + An object to parse. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets or sets an object that represents an object. + An object that represents an object. + The property was set to . + The property of the value set to the property is not "EncryptionProperty". +-or- +The property of the value set to the property is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets the target of the object. + The target of the object. + + + Represents a collection of classes used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds an object to the object. + An object to add to the object. + The position at which the new element is inserted. + + + Removes all items from the object. + + + Determines whether the object contains a specific object. + The object to locate in the object. + + if the object is found in the object; otherwise, . + + + Copies the elements of the object to an array, starting at a particular array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Copies the elements of the object to an array of objects, starting at a particular array index. + The one-dimensional array of objects that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through an object. + An object that can be used to iterate through an object. + + + Determines the index of a specific item in the object. + The object to locate in the object. + The index of if found in the collection; otherwise, -1. + + + Inserts an object into the object at the specified position. + The zero-based index at which should be inserted. + An object to insert into the object. + + + Gets a value that indicates whether the object has a fixed size. + + if the object has a fixed size; otherwise, . + + + Gets a value that indicates whether the object is read-only. + + if the object is read-only; otherwise, . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Gets or sets the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Removes the first occurrence of a specific object from the object. + The object to remove from the object. + + + Removes the object at the specified index. + The zero-based index of the object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + Adds an item to the . + The to add to the . + The position into which the new element was inserted. + + uses an incorrect object type. + + + Determines whether the contains a specific value. + The to locate in the . + + if the is found in the ; otherwise, . + + uses an incorrect object type. + + + Determines the index of a specific item in the . + The to locate in the . + The index of if found in the list; otherwise, -1. + + uses an incorrect object type. + + + Inserts an item to the at the specified index. + The zero-based index at which should be inserted. + The to insert into the . + + uses an incorrect object type. + + + Gets the element at the specified index. + The to remove from the . + The element at the specified index. + + + Removes the first occurrence of a specific object from the . + The to remove from the . + + uses an incorrect object type. + + + Defines methods that decrypt an XrML element. + + + Decrypts an XrML element that is contained within a object. + An object that encapsulates the algorithm used for XML encryption. + A object that contains an asymmetric key to use for decryption. + A stream object that contains an element to decrypt. + A object that contains a decrypted element. + + + Represents an XML digital signature or XML encryption element. + + + Initializes a new instance of the class. + + + Adds a that represents a particular type of information to the object. + The to add to the object. + + + Gets the number of objects contained in the object. + The number of objects contained in the object. + + + Returns an enumerator of the objects in the object. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns an enumerator of the objects of the specified type in the object. + The type of object to enumerate. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the key information identity. + The key information identity. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + + + Represents the abstract base class from which all implementations of subelements inherit. + + + Initializes a new instance of . + + + When overridden in a derived class, returns an XML representation of the . + An XML representation of the . + + + When overridden in a derived class, parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Wraps the class, it to be placed as a subelement of the class. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object that encapsulates an encrypted key. + + + Gets or sets an object that encapsulates an encrypted key. + An object that encapsulates an encrypted key. + The property is . + + + Returns an XML representation of a object. + An XML representation of a object. + The encrypted key is . + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + + + Represents a subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the string identifier that is the value of the element. + The string identifier that is the value of the element. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + + + Gets or sets the string identifier contained within a element. + The string identifier that is the value of the element. + + + Handles subelements that do not have specific implementations or handlers registered on the machine. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with content taken from the specified . + An XML element from which to take the content used to create the new instance of . + + + Returns an XML representation of the . + An XML representation of the . + + + Parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Gets or sets the XML content of the current . + The XML content of the current . + + + References objects stored at a different location when using XMLDSIG or XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object and the URI that describes the type of data to retrieve. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + The URI that describes the type of data to retrieve. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The XML element that specifies the state of the object. + The parameter is . + + + Gets or sets a Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + A Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + + + Gets or sets the Uniform Resource Identifier (URI) of the object. + The Uniform Resource Identifier (URI) of the object. + + + Represents an subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified ASN.1 DER encoding of an X.509v3 certificate. + The ASN.1 DER encoding of an object to initialize the new instance of from. + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + The parameter is . + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + One of the values that specifies how much of the certificate chain to include. + The parameter is . + The certificate has only a partial certificate chain. + + + Adds the specified X.509v3 certificate to the . + The object to add to the object. + The parameter is . + + + Adds the specified issuer name and serial number pair to the object. + The issuer name portion of the pair to add to the object. + The serial number portion of the pair to add to the object. + + + Adds the specified subject key identifier (SKI) byte array to the object. + A byte array that represents the subject key identifier (SKI) to add to the object. + + + Adds the specified subject key identifier (SKI) string to the object. + A string that represents the subject key identifier (SKI) to add to the object. + + + Adds the subject name of the entity that was issued an X.509v3 certificate to the object. + The name of the entity that was issued an X.509 certificate to add to the object. + + + Gets a list of the X.509v3 certificates contained in the object. + A list of the X.509 certificates contained in the object. + + + Gets or sets the Certificate Revocation List (CRL) contained within the object. + The Certificate Revocation List (CRL) contained within the object. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Gets a list of structures that represent an issuer name and serial number pair. + A list of structures that represent an issuer name and serial number pair. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + The parameter does not contain an <> node. +-or- +The parameter does not contain an <> node. + + + Gets a list of the subject key identifiers (SKIs) contained in the object. + A list of the subject key identifiers (SKIs) contained in the object. + + + Gets a list of the subject names of the entities contained in the object. + A list of the subject names of the entities contained in the object. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class for XML encryption. + + + Initializes a new instance of the class for XML encryption using the supplied Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted key. + + + Initializes a new instance of the class for XML encryption using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted key. + A object that describes transforms to do on the encrypted key. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with a hash value of the specified . + The with which to initialize the new instance of . + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance of . + + + Adds a object to the list of transforms to be performed on the data before passing it to the digest algorithm. + The transform to be added to the list of transforms. + The parameter is . + + + Gets or sets the digest method Uniform Resource Identifier (URI) of the current . + The digest method URI of the current . The default value is http://www.w3.org/2000/09/xmldsig#sha1. + + + Gets or sets the digest value of the current . + The digest value of the current . + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain any transforms. +-or- +The parameter contains an unknown transform. + + + Gets the transform chain of the current . + The transform chain of the current . + + + Gets or sets the type of the object being signed. + The type of the object being signed. + + + Gets or sets the of the current . + The of the current . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a or object to the collection. + A or object to add to the collection. + The position at which the new element was inserted. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Removes all items from the collection. + + + Determines whether the collection contains a specific or object. + The or object to locate in the collection. + + if the or object is found in the collection; otherwise, . + + + Copies the elements of the object to an array, starting at a specified array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through a collection. + An object that can be used to iterate through a collection. + + + Determines the index of a specific item in the collection. + The or object to locate in the collection. + The index of if found in the collection; otherwise, -1. + + + Inserts a or object into the collection at the specified position. + The zero-based index at which should be inserted. + A or object to insert into the collection. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the or object at the specified index. + The index of the or object to return. + The or object at the specified index. + + + Gets or sets the or object at the specified index. + The index of the or object to return. + The object at the specified index. + + + Removes the first occurrence of a specific or object from the collection. + The or object to remove from the collection. + + + Removes the or object at the specified index. + The zero-based index of the or object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + For a description of this member, see . + + if the has a fixed size; otherwise, . + + + For a description of this member, see . + + if the is read-only; otherwise, . + + + For a description of this member, see . + The zero-based index of the element to get or set. + The element at the specified index. + + is not a valid index in the . + + + Represents the <> element of an XML signature. + + + Initializes a new instance of the class with a new randomly generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of that holds the public key. + + + Returns the XML representation of the key clause. + The XML representation of the key clause. + + + Gets or sets the instance of that holds the public key. + The instance of that holds the public key. + + + Loads an key clause from an XML element. + The XML element from which to load the key clause. + The parameter is . + The parameter is not a valid key clause XML element. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class. + + + Adds a to the list of objects to be signed. + The to be added to the list of objects to be signed. + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Gets or sets the of the current . + The of the current . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain a valid . +-or- +The parameter does not contain a valid . + + + Gets or sets a list of objects to be signed. + A list of objects to be signed. + + + Gets or sets the value of the digital signature. + A byte array that contains the value of the digital signature. + + + Gets or sets the of the current . + The of the current . + + + Contains information about the canonicalization algorithm and signature algorithm used for the XML signature. + + + Initializes a new instance of the class. + + + Adds a object to the list of references to digest and sign. + The reference to add to the list of references. + The reference parameter is . + + + Gets or sets the canonicalization algorithm that is used before signing for the current object. + The canonicalization algorithm used before signing for the current object. + + + Gets a object used for canonicalization. + A object used for canonicalization. + + is . + + + Copies the elements of this instance into an object, starting at a specified index in the array. + An object that holds the collection's elements. + The beginning index in the array where the elements are copied. + This method is not supported. + + + Gets the number of references in the current object. + The number of references in the current object. + This property is not supported. + + + Returns an enumerator that iterates through the collection of references. + An enumerator that iterates through the collection of references. + This method is not supported. + + + Returns the XML representation of the object. + The XML representation of the instance. + The property is . +-or- +The property is empty. + + + Gets or sets the ID of the current object. + The ID of the current object. + + + Gets a value that indicates whether the collection is read-only. + + if the collection is read-only; otherwise, . + This property is not supported. + + + Gets a value that indicates whether the collection is synchronized. + + if the collection is synchronized; otherwise, . + This property is not supported. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter is not a valid element. +-or- +The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Gets a list of the objects of the current object. + A list of the elements of the current object. + + + Gets or sets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets or sets the name of the algorithm used for signature generation and validation for the current object. + The name of the algorithm used for signature generation and validation for the current object. + + + Gets an object to use for synchronization. + An object to use for synchronization. + This property is not supported. + + + Provides a wrapper on a core XML signature object to facilitate creating XML signatures. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified XML document. + The object to use to initialize the new instance of . + The parameter is . +-or- +The parameter contains a null property. + + + Initializes a new instance of the class from the specified object. + The object to use to initialize the new instance of . + The parameter is . + + + Adds a object to the list of objects to be signed. + The object to add to the list of objects to be signed. + + + Adds a object to the object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + The object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + + + Determines whether the property verifies using the public key in the signature. + + if the property verifies; otherwise, . + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified key. + The implementation of the property that holds the key to be used to verify the property. + + if the property verifies for the specified key; otherwise, . + The parameter is . + The property of the parameter does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified message authentication code (MAC) algorithm. + The implementation of that holds the MAC to be used to verify the property. + + if the property verifies for the specified MAC; otherwise, . + The parameter is . + The property of the specified object is not valid. +-or- +The property is . +-or- +The cryptographic transform used to check the signature could not be created. + + + Determines whether the property verifies for the specified object and, optionally, whether the certificate is valid. + The object to use to verify the property. + + to verify the signature only; to verify both the signature and certificate. + + if the signature is valid; otherwise, . +-or- + if the signature and certificate are valid; otherwise, . + The parameter is . + A signature description could not be created for the parameter. + + + Determines whether the property verifies using the public key in the signature. + When this method returns, contains the implementation of that holds the public key in the signature. This parameter is passed uninitialized. + + if the property verifies using the public key in the signature; otherwise, . + The parameter is null. + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Computes an XML digital signature. + The property is . +-or- +The property is not a object or object. +-or- +The key could not be loaded. + + + Computes an XML digital signature using the specified message authentication code (MAC) algorithm. + A object that holds the MAC to be used to compute the value of the property. + The parameter is . + The object specified by the parameter is not an instance of . +-or- +The property of the specified object is not valid. +-or- +The cryptographic transform used to check the signature could not be created. + + + Gets or sets an object that defines the XML encryption processing rules. + An object that defines the XML encryption processing rules. + + + Returns the object with the specified ID from the specified object. + The object to retrieve the object from. + The ID of the object to retrieve from the object. + The object with the specified ID from the specified object, or if it could not be found. + + + Returns the public key of a signature. + An object that contains the public key of the signature, or if the key cannot be found. + The property is . + + + Returns the XML representation of a object. + The XML representation of the object. + The property is . +-or- +The property is . + + + Gets or sets the object of the current object. + The object of the current object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Represents the object of the current object. + + + Represents the name of the installed key to be used for signing the object. + + + Sets the current object. + The current object. The defaults is a object. + + + Gets the names of methods whose canonicalization algorithms are explicitly allowed. + A collection of the names of methods that safely produce canonical XML. + + + Gets the object of the current object. + The object of the current object. + + + Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature. + + if the format is acceptable; otherwise, . + + + Gets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets the signature method of the current object. + The signature method of the current object. + + + Gets the signature value of the current object. + A byte array that contains the signature value of the current object. + + + Gets the object of the current object. + The object of the current object. + + + Gets or sets the asymmetric algorithm key used for signing a object. + The asymmetric algorithm key used for signing the object. + + + Gets or sets the name of the installed key to be used for signing the object. + The name of the installed key to be used for signing the object. + + + Represents the Uniform Resource Identifier (URI) for the XML mode decryption transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the base 64 transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures and includes comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for enveloped signature transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard minimal canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard namespace for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard signature method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-256 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-384 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-512 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the XML Path Language (XPath). This field is constant. + + + Represents the Uniform Resource Identifier (URI) for XSLT transformations. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the license transform algorithm used to normalize XrML licenses for signatures. + + + Represents the abstract base class from which all elements that can be used in an XML digital signature derive. + + + Initializes a new instance of the class. + + + Gets or sets the Uniform Resource Identifier (URI) that identifies the algorithm performed by the current transform. + The URI that identifies the algorithm performed by the current object. + + + Gets or sets an object that represents the document context under which the current object is running. + An object that represents the document context under which the current object is running. + + + When overridden in a derived class, returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + When overridden in a derived class, returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + When overridden in a derived class, returns the output of the current object. + The output of the current object. + + + When overridden in a derived class, returns the output of the current object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + + + Returns the XML representation of the current object. + The XML representation of the current object. + + + When overridden in a derived class, gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + When overridden in a derived class, parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + + + When overridden in a derived class, gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Gets or sets a object that contains the namespaces that are propagated into the signature. + A object that contains the namespaces that are propagated into the signature. + The property was set to . + + + Sets the current object. + The current object. This property defaults to an object. + + + Defines an ordered list of objects that is applied to unsigned content prior to digest calculation. + + + Initializes a new instance of the class. + + + Adds a transform to the list of transforms to be applied to the unsigned content prior to digest calculation. + The transform to add to the list of transforms. + + + Gets the number of transforms in the object. + The number of transforms in the object. + + + Returns an enumerator of the transforms in the object. + An enumerator of the transforms in the object. + + + Gets the transform at the specified index in the object. + The index into the object that specifies which transform to return. + The transform at the specified index in the object. + The parameter is greater than the number of transforms. + + + Specifies the order of XML Digital Signature and XML Encryption operations when both are performed on the same document. + + + Initializes a new instance of the class. + + + Adds a Uniform Resource Identifier (URI) to exclude from processing. + A Uniform Resource Identifier (URI) to exclude from processing + The parameter is . + + + Gets or sets an object that contains information about the keys necessary to decrypt an XML document. + An object that contains information about the keys necessary to decrypt an XML document. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + A decryption key could not be found. + + + Returns the output of the current object. + The type of the output to return. is the only valid type for this parameter. + The output of the current object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Determines whether the ID attribute of an object matches a specified value. + An object with an ID attribute to compare with . + The value to compare with the ID attribute of . + + if the ID attribute of the parameter matches the parameter; otherwise, . + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + The parameter is . +-or- +The Uniform Resource Identifier (URI) value of an object in was not found. +-or- +The length of the URI value of an object in is 0. +-or- +The first character of the URI value of an object in is not '#'. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the decoding transform as defined in Section 6.6.2 of the XMLDSIG specification. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns the digest associated with an object. + The object used to create a digest. + The digest associated with an object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because this element has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a object and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Represents the enveloped signature transform for an XML digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + The containing XML document is . + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified as transform-specific content of a element and configures the internal state of the current object to match the element. + An to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is . + The containing XML document is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a value that determines whether to include comments. + + to include comments; otherwise, . + + + Initializes a new instance of the class specifying whether to include comments, and specifying a list of namespace prefixes. + + to include comments; otherwise, . + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object as an object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + The parameter is not a object. +-or- +The parameter does not derive from a object. + + + Gets or sets a string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + A string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is not a object. +-or- +The parameter is not an object. +-or- +The parameter is not an object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Represents the XPath transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object to load into the current object. + The parameter is . +-or- +The parameter does not contain an element. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the XSLT transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that encapsulates an XSLT style sheet to load into the current object. This style sheet is applied to the document loaded by the method. + The parameter is . +-or- +The parameter does not contain an object. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the license transform algorithm used to normalize XrML licenses for signatures. + + + Initializes a new instance of the class. + + + Gets or sets the decryptor of the current object. + The decryptor of the current object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of an object. + The output of the object. + + + Returns the output of an object. + The type of the output to return. is the only valid type for this parameter. + The output of the object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of types that are valid inputs to the method of the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object that encapsulates the transform to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. The type of the input object must be . + The context was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The property was not set before this transform was invoked. + + + Gets an array of types that are valid outputs from the method of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + \ No newline at end of file diff --git a/Bin/System.Security.Permissions.dll b/Bin/System.Security.Permissions.dll new file mode 100644 index 0000000..5a5f765 Binary files /dev/null and b/Bin/System.Security.Permissions.dll differ diff --git a/Bin/System.Security.Permissions.dll.refresh b/Bin/System.Security.Permissions.dll.refresh new file mode 100644 index 0000000..d1be6cc Binary files /dev/null and b/Bin/System.Security.Permissions.dll.refresh differ diff --git a/Bin/System.Security.Permissions.xml b/Bin/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/Bin/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/Bin/System.Security.Principal.Windows.dll b/Bin/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..2027a85 Binary files /dev/null and b/Bin/System.Security.Principal.Windows.dll differ diff --git a/Bin/System.Security.Principal.Windows.dll.refresh b/Bin/System.Security.Principal.Windows.dll.refresh new file mode 100644 index 0000000..f711b24 Binary files /dev/null and b/Bin/System.Security.Principal.Windows.dll.refresh differ diff --git a/Bin/System.Security.Principal.Windows.xml b/Bin/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/Bin/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/Persons.sln b/Persons.sln index 0ffeae1..35d1ae5 100644 --- a/Persons.sln +++ b/Persons.sln @@ -1,24 +1,27 @@  -Microsoft Visual Studio Solution File, Format Version 11.00 -# Visual Studio 2010 +Microsoft Visual Studio Solution File, Format Version 12.00 +# Visual Studio Version 17 +VisualStudioVersion = 17.14.36202.13 d17.14 +MinimumVisualStudioVersion = 10.0.40219.1 Project("{E24C65DC-7377-472B-9ABA-BC803B73C61A}") = "Persons", ".", "{01466341-5651-4D0B-B2AD-BB919828C4C3}" ProjectSection(WebsiteProperties) = preProject - TargetFrameworkMoniker = ".NETFramework,Version%3Dv4.0" + TargetFrameworkMoniker = ".NETFramework,Version%3Dv4.8.1" Debug.AspNetCompiler.VirtualPath = "/Persons" - Debug.AspNetCompiler.PhysicalPath = "..\Persons\" + Debug.AspNetCompiler.PhysicalPath = "..\cudreg-saml2\" Debug.AspNetCompiler.TargetPath = "PrecompiledWeb\Persons\" Debug.AspNetCompiler.Updateable = "true" Debug.AspNetCompiler.ForceOverwrite = "true" Debug.AspNetCompiler.FixedNames = "false" Debug.AspNetCompiler.Debug = "True" Release.AspNetCompiler.VirtualPath = "/Persons" - Release.AspNetCompiler.PhysicalPath = "..\Persons\" + Release.AspNetCompiler.PhysicalPath = "..\cudreg-saml2\" Release.AspNetCompiler.TargetPath = "PrecompiledWeb\Persons\" Release.AspNetCompiler.Updateable = "true" Release.AspNetCompiler.ForceOverwrite = "true" Release.AspNetCompiler.FixedNames = "false" Release.AspNetCompiler.Debug = "False" VWDPort = "15607" + SlnRelativePath = "..\cudreg-saml2\" EndProjectSection EndProject Global @@ -31,4 +34,7 @@ Global GlobalSection(SolutionProperties) = preSolution HideSolutionNode = FALSE EndGlobalSection + GlobalSection(ExtensibilityGlobals) = postSolution + SolutionGuid = {96BE475B-F3EB-4AA3-BE04-E7472D07177E} + EndGlobalSection EndGlobal diff --git a/SAML/Login.aspx b/SAML/Login.aspx new file mode 100644 index 0000000..2435aab --- /dev/null +++ b/SAML/Login.aspx @@ -0,0 +1,13 @@ +<%@ Page Language="VB" AutoEventWireup="false" CodeFile="Login.aspx.vb" Inherits="SAML.Login" %> + + + + + Login with ADFS + + +
+ + + + diff --git a/SAML/Login.aspx.vb b/SAML/Login.aspx.vb new file mode 100644 index 0000000..ef28565 --- /dev/null +++ b/SAML/Login.aspx.vb @@ -0,0 +1,13 @@ +Imports System.Web + +Namespace SAML + Partial Public Class Login + Inherits System.Web.UI.Page + + Protected Sub btnLogin_Click(sender As Object, e As EventArgs) + Dim samlRequest As String = SamlHelper.CreateAuthRequest("https://cudreg.com", "https://localhost:7009/SAML/PostResponse.aspx") + Dim redirectUrl As String = "https://sso.satitm.chula.ac.th/adfs/ls?SAMLRequest=" & HttpUtility.UrlEncode(samlRequest) + Response.Redirect(redirectUrl) + End Sub + End Class +End Namespace diff --git a/SAML/PostResponse.aspx b/SAML/PostResponse.aspx new file mode 100644 index 0000000..f59e1d7 --- /dev/null +++ b/SAML/PostResponse.aspx @@ -0,0 +1,13 @@ +<%@ Page Language="VB" AutoEventWireup="true" CodeFile="PostResponse.aspx.vb" Inherits="SAML.PostResponse" %> + + + + + SAML Response + + +
+
+
+ + diff --git a/SAML/PostResponse.aspx.vb b/SAML/PostResponse.aspx.vb new file mode 100644 index 0000000..46bb97c --- /dev/null +++ b/SAML/PostResponse.aspx.vb @@ -0,0 +1,58 @@ +Namespace SAML + Partial Public Class PostResponse + Inherits System.Web.UI.Page + + Protected Sub Page_Load(sender As Object, e As EventArgs) + Dim samlResponse = Request.Form("SAMLResponse") + If String.IsNullOrEmpty(samlResponse) Then + result.InnerHtml = "

No SAML Response found

" + Return + End If + + Dim cert As String = _ + "-----BEGIN CERTIFICATE-----" & vbCrLf & _ + "MIIE6DCCAtCgAwIBAgIQOQaY6KUdPItB52hpOsIBvjANBgkqhkiG9w0BAQsFADAw" & vbCrLf & _ + "MS4wLAYDVQQDEyVBREZTIFNpZ25pbmcgLSBzc28uc2F0aXRtLmNodWxhLmFjLnRo" & vbCrLf & _ + "MB4XDTI1MDQwNjEyNTQxNFoXDTI2MDQwNjEyNTQxNFowMDEuMCwGA1UEAxMlQURG" & vbCrLf & _ + "UyBTaWduaW5nIC0gc3NvLnNhdGl0bS5jaHVsYS5hYy50aDCCAiIwDQYJKoZIhvcN" & vbCrLf & _ + "AQEBBQADggIPADCCAgoCggIBAMlu6kjF9Ghsr9Z6+AIYRjHTx4OL6fROrCzq26/h" & vbCrLf & _ + "YBfsrsL5QeJlWtYhRsbrW3wAFaQukNYal5LRJx8BXXlngIDIfoIEixT62BqFC2XO" & vbCrLf & _ + "Ju7Rq+p1ei2WZb06V0It8ohmZVPqsDPzygjBblta27DBGQ8qQ4upGVTwOIBRisMj" & vbCrLf & _ + "Ixxx90p6DeB2ZCiGOYCYMYPdFWwz8QCZv64WbWRw3WhRKla05nyiV352aaC53XL0" & vbCrLf & _ + "ZZlRFV8jj6YiKsbKEzkxKpDVxEaH28NGVptBJyfkU5VOpqkmZZtqhSCrrIprfa+j" & vbCrLf & _ + "Dl6De9Siq8/CUDoZhkhRoNUqmhaiu0ZbV3AF0iN+XLtmeP/GJREz5m3gOoAGH8Rl" & vbCrLf & _ + "g5pyca6vmSnJHKnTsu8Elc4pVvO6jH1hqdBLVFa4uftqqBY2B/ZuUXj7764eHsMZ" & vbCrLf & _ + "kHZC6SXOxAP2BPbRbslbd4CRErnuE5rgMRQAYQVWcrDvagUdvm2T1+wJN7GmwBg9" & vbCrLf & _ + "GGhTA3r9howvIj2RFLxCZbpy2QlWKMb1zjyvtCHrM7g8/aGuvJfY5cmfww5aib4a" & vbCrLf & _ + "QpJq+ZyCPZpW8iXZTnxVuyV57WFTOmCvy/9dfK/IQXEqG5FIikwaB2nyL/D5FXIP" & vbCrLf & _ + "xH+OzLeLdLlKe2zpOJgx2p1M6rJ29AJRASKs+ikqlSV/i5t+1sw2qinFKJ8ZegsN" & vbCrLf & _ + "HDgBAgMBAAEwDQYJKoZIhvcNAQELBQADggIBABzrTEbbzMHbq0mIV1w3TL6IVOv8" & vbCrLf & _ + "BeXoYznSI7P/MhJwBXMbrYNNbpSkv5jWhtSAWQWrDrN0IUqvKwIYYRlRtgvma6Mk" & vbCrLf & _ + "PFXRvzkVhpuqm/bp1HAH2yoJUXNuWInzdJeMnPaQymU/hSvSJ8f66pwlPrAYTSBk" & vbCrLf & _ + "YIbcEdLJ3OmcnjOjj4W+s70J0s0HTnNQboAzjue3SmpsPVVetP+cwaoIASz2M6Fr" & vbCrLf & _ + "wfqFaUUiSAxcUzfELOyN8d1dnRFQVkrNyayz0fHH2Kje5GnGLMNaZTKZ88nVbmoq" & vbCrLf & _ + "Cbow7ofjEb74jNwWhmRhntuEE0I1W55LnU3Srjptjnfkd604W60DbqiWBKM6rTTb" & vbCrLf & _ + "ilCJsW3umI26/eFZAfZIA2n7/FKDcDXFCJOM1UV+09pZ12p0TAaA3nyA2TbdI+PM" & vbCrLf & _ + "GtvvEK2PU+tdU64uAlOOaldk52dIuR7kOVBk53Gf3K2wY2U/oovLrlXLHb8NJD49" & vbCrLf & _ + "Po6XT3w6WL+okyr7FgdmAHTNpTnthXG0pyN4KUFEAK9HWXdGRWUgFX4yBOjmPN1N" & vbCrLf & _ + "Vx7G3klMd+ccQUU80lxDKQUbjhcWLloWNlg6w2SKk4Ku7/f8HmPkqppvFow+ytWm" & vbCrLf & _ + "0abcCjptoUrFR1BCM86CIDCo9bEWIyWv+SHr2AvlQ8D0Z8aQRr6M73NN1PNWruPf" & vbCrLf & _ + "bpD2ekhB2vZ9R2ij" & vbCrLf & _ + "-----END CERTIFICATE-----" + + Try + Dim resp = New SamlHelper.Response(cert, samlResponse) + If resp.IsValid() Then + Dim email = resp.GetEmail() + Dim firstName = resp.GetFirstName() + Dim lastName = resp.GetLastName() + result.InnerHtml = "

Welcome, " & firstName & " " & lastName & "

Email: " & email & "

" + Else + result.InnerHtml = "

Invalid SAML Response

" + End If + Catch ex As Exception + result.InnerHtml = "

Error parsing response: " & ex.Message & "

" + End Try + End Sub + End Class +End Namespace diff --git a/SSLProxy/Dockerfile b/SSLProxy/Dockerfile new file mode 100644 index 0000000..bd11266 --- /dev/null +++ b/SSLProxy/Dockerfile @@ -0,0 +1,19 @@ +FROM nginx:alpine + +# Create directories for SSL certificates +RUN mkdir -p /etc/ssl/certs /etc/ssl/private + +# Copy SSL certificates +COPY nginx.crt /etc/ssl/certs/ +COPY nginx.key /etc/ssl/private/ + +# Set proper permissions for private key +RUN chmod 600 /etc/ssl/private/nginx.key + +# Copy nginx configuration +COPY nginx.conf /etc/nginx/nginx.conf + +# Expose HTTPS port +EXPOSE 7009 + +CMD ["nginx", "-g", "daemon off;"] \ No newline at end of file diff --git a/SSLProxy/docker-compose.yaml b/SSLProxy/docker-compose.yaml new file mode 100644 index 0000000..c3a019d --- /dev/null +++ b/SSLProxy/docker-compose.yaml @@ -0,0 +1,9 @@ +version: '3.8' + +services: + ssl-proxy: + build: . + ports: + - "7009:7009" + restart: unless-stopped + network_mode: host \ No newline at end of file diff --git a/SSLProxy/nginx.conf b/SSLProxy/nginx.conf new file mode 100644 index 0000000..c98d4aa --- /dev/null +++ b/SSLProxy/nginx.conf @@ -0,0 +1,30 @@ +events { + worker_connections 1024; +} + +http { + upstream backend { + server localhost:15607; + } + + server { + listen 7009 ssl; + server_name localhost; + + ssl_certificate /etc/ssl/certs/nginx.crt; + ssl_certificate_key /etc/ssl/private/nginx.key; + + ssl_protocols TLSv1.2 TLSv1.3; + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + location / { + proxy_pass http://backend; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto https; + proxy_redirect off; + } + } +} \ No newline at end of file diff --git a/SSLProxy/nginx.crt b/SSLProxy/nginx.crt new file mode 100644 index 0000000..bda82fa --- /dev/null +++ b/SSLProxy/nginx.crt @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDZzCCAk+gAwIBAgIUT8oDOYQNQz9DvYck7BXLBHR4VN0wDQYJKoZIhvcNAQEL +BQAwQzELMAkGA1UEBhMCVEgxEDAOBgNVBAgMB0Jhbmdrb2sxDjAMBgNVBAoMBUNo +dWxhMRIwEAYDVQQDDAlsb2NhbGhvc3QwHhcNMjUwNjA4MTAyODIxWhcNMjYwNjA4 +MTAyODIxWjBDMQswCQYDVQQGEwJUSDEQMA4GA1UECAwHQmFuZ2tvazEOMAwGA1UE +CgwFQ2h1bGExEjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQAD +ggEPADCCAQoCggEBALk5W+iOKTBMI/AF99lHKWdTUf8UwrZtf/4jG3k3mNGLe7No +DQrGav+m21m14zVZvAl3xgdoNiSFoJvyk9j8Y2cf+agfFdWDiwbSjfLtRDhx2ry9 +IZmDrd/XNJPgr5dUL13ClERu+3pk5B+kkU+CJ7d7turXvwhJ3zra2t5zt2CuR1HS +MYABnhRX7aw/H/qQaLICA9HhfBe1DRPSt/YvzPKLxpfPqH5eTxNyIChPb9nznz7i +5dPmemX/+uPD4/zjfk9xXJK4E/aTR3rI6ak3GLqMQP0CEw/6Km5+3X4YYKnJRpm2 +YiTGYxqlC2BdjlEVxXcLQv5y+xV0n6OlS+HJxmUCAwEAAaNTMFEwHQYDVR0OBBYE +FPe6TUYe7xFXtdnUi+sWY9ms9ijbMB8GA1UdIwQYMBaAFPe6TUYe7xFXtdnUi+sW +Y9ms9ijbMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBABOpG8s0 +GwPE9iWsQTtqC4dgc7RFRLvP8BXAQiEJ3Xv6bDoJbxV4gPPmj4FbEY6ZZ7zzRf/g +sgOrwap+t9vSKTsmEizkYgEGFNsfpf826zqwzKClwyb5CmR19xJvRqnKui1SnSJq +y/occobRqBV4LE2ZbJNHoV7ltjW41FnYgolqyKzwK/+UZoMdvlDQemVI7mDArVdU +VIk7kV4H647Ti8ik/+klMyuIGP/nNKCKwr4eayrts5cYsx0fWMclaHxfDcu6VqgG +v2MdUt+Tbx1xoEDBo/C+8tUaHq0ddX5lGISUxGnGsHLoWIY2wZQXTlO8Oo3FP48J +v9USyuUGyenWZSo= +-----END CERTIFICATE----- diff --git a/SSLProxy/nginx.key b/SSLProxy/nginx.key new file mode 100644 index 0000000..ac8a8b7 --- /dev/null +++ b/SSLProxy/nginx.key @@ -0,0 +1,28 @@ +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC5OVvojikwTCPw +BffZRylnU1H/FMK2bX/+Ixt5N5jRi3uzaA0Kxmr/pttZteM1WbwJd8YHaDYkhaCb +8pPY/GNnH/moHxXVg4sG0o3y7UQ4cdq8vSGZg63f1zST4K+XVC9dwpREbvt6ZOQf +pJFPgie3e7bq178ISd862trec7dgrkdR0jGAAZ4UV+2sPx/6kGiyAgPR4XwXtQ0T +0rf2L8zyi8aXz6h+Xk8TciAoT2/Z858+4uXT5npl//rjw+P8435PcVySuBP2k0d6 +yOmpNxi6jED9AhMP+ipuft1+GGCpyUaZtmIkxmMapQtgXY5RFcV3C0L+cvsVdJ+j +pUvhycZlAgMBAAECggEAChzv3/dtF8o8dxU4VlhskgvqUPFW/UNmxt8vV5O5yA0j +1KSUe7dgLbO0S8Zi0K2k1uZ/fTWLKTzTi1g4CtOi8MU96hhCZq0/OMDjx7T9MdDD +luUDseBO7McRA5bzt2E9EdM3KbJekCz0iKbBWVQ7q2i5kMJ1V3RDGDFNXHJ4e3KI +gbBjB13czQLyCL2hUFNiehJqy18CvBFWfjWaI33xfw2VdW1BHtbhTbXqELOwGMyy +SKbcwJxJ3/xcF+vCuqqfZVITIUMAhS6vJ1l7IOp7k9KslXgZU2+5Y9fGRoCxu8/x +pjkguG+3ZGPxUXFIFoCsccY25V7dV0ZPZviTh1zLOQKBgQD77SEIu9y4So0wQ4jX +okTgkjsIoLnqEFBH5njpqJAXfJi5whkJYK0LIjTd1F+p29c0/YH1iI/BOzJ1nRY1 +6xQHgDMg/pXhQR8x2QE3iHUSDZu3X2aRz4AJJBsXIOvsrfsH22lmPfeCumCbCHLU +ZFLUExNOxZpO6Hl8Oy9OnOfQ/QKBgQC8OBw55ovfTgEcDC1F7vgSmXG/Mz5HIqDq +e88l2QCY5bZYQjYk6cmmxeLl4rN+oQet7amZB/7jEmzucU+SYzOaOkGUtymZvGV7 +xoswiNh0lH1S21qqXm6o5W4od0DcnYRFoqWzp/Y4PdS+p+Ut8qUmHyZ/p2p2ePMB +Z6PCW4VbiQKBgQDUAoZnZDnm+g6BzIPv/IZ8e3Ok2iY7fckiCSo+cXX53ghlY5xQ +UQSvtvTIrn5nYzRkSufAq1FXa6sWYcGcVJ5BhbkBjl6x92z6NUaZ5oOnUr51/ppC +IV790l3eA/2n6+6zeQnlWkbexFyie+SvK1KtWPRJuXAX8fqy+tfgD5njPQKBgQCH +irSw8ZiKn+bmptI3iWa2JjAmq6VOnt5Y3f4H2GS4trwAhPXu0Tk5U0oZmI8AQsB/ +/SVkIcDpDwzJDWprFetERm2RxfE8V9KRNyJnOjT+hyxU7cg15jk0gbw5gd+AwCJP +71f6r5r9V3GMNuYwl4tcj5Qu24YseN8uhM8GGNhJWQKBgB0zUIFt04NHy8xydjzn +uGFjel56SLbp7eD4nvP8Oc1BmBJp1coEJ1E4YgQZ8Ps4JPiMY+P0txBC7hqWrQGI +itIZiMsMVoQfCJ2Odbdi9yAvDQCtZ7oJZv7zrupTfsfK3zS7GtxysC+PQ5KcvifF +tCtCJW9Uao2thEz5InDBuMXK +-----END PRIVATE KEY----- diff --git a/packages.config b/packages.config new file mode 100644 index 0000000..3f5dc8e --- /dev/null +++ b/packages.config @@ -0,0 +1,16 @@ + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/.signature.p7s b/packages/Microsoft.IdentityModel.Logging.5.2.4/.signature.p7s new file mode 100644 index 0000000..c3cf510 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/.signature.p7s differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/Microsoft.IdentityModel.Logging.5.2.4.nupkg b/packages/Microsoft.IdentityModel.Logging.5.2.4/Microsoft.IdentityModel.Logging.5.2.4.nupkg new file mode 100644 index 0000000..f5ec8a0 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/Microsoft.IdentityModel.Logging.5.2.4.nupkg differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.dll b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.dll new file mode 100644 index 0000000..c2b69c4 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.dll differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.pdb b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.pdb new file mode 100644 index 0000000..16146ce Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.pdb differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.xml b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.xml new file mode 100644 index 0000000..2b45edd --- /dev/null +++ b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net45/Microsoft.IdentityModel.Logging.xml @@ -0,0 +1,398 @@ + + + + Microsoft.IdentityModel.Logging + + + + + Event source based logger to log different events. + + + + + Static logger that is exposed externally. An external application or framework can hook up a listener to this event source to log data in a custom way. + + + + + Flag which indicates whether or not PII is shown in logs. False by default. + + + + + String that is used in place of any arguments to log messages if the 'ShowPII' flag is set to false. + + + + + Indicates whether or the log message header (contains library version, date/time, and PII debugging information) has been written. + + + + + The log message that indicates the current library version. + + + + + The log message that indicates the date. + + + + + The log message that is shown when PII is off. + + + + + The log message that is shown when PII is off. + + + + + Writes an event log by using the provided string argument and current UTC time. + No level filtering is done on the event. + + The log message. + No level filtering. + + + + Writes an event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a verbose event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a verbose event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an information event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an information event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a warning event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a warning event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an error event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an error event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a critical event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a critical event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument and current UTC time. + + + + The log message. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument, arguments list and current UTC time. + + + + The log message. + An object array that contains zero or more objects to format. + + + + Minimum log level to log events. Default is Warning. + + + + + Helper class for logging. + + + + + Logs an exception using the event source logger and returns new exception. + + argument that is null or empty. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger. + + The exception to log. + + + + Logs an exception using the event source logger. + + Identifies the level of an event to be logged. + The exception to log. + + + + Logs an information event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a verbose event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a warning event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Formats the string using InvariantCulture + + Format string. + Format arguments. + Formatted string. + + + + Log messages and codes for Microsoft.IdentityModel.Logging + + + + + Event listener that writes logs to a file or a fileStream provided by user. + + + + + Name of the default log file, excluding its path. + + + + + Initializes a new instance of that writes logs to text file. + + + + + Initializes a new instance of that writes logs to text file. + + location of the file where log messages will be written. + + + + Initializes a new instance of that writes logs to text file. + + StreamWriter where logs will be written. + + + + Called whenever an event has been written by an event source for which the event listener has enabled events. + + + + + + Releases all resources used by the current instance of the class. + + + + diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.dll b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.dll new file mode 100644 index 0000000..60c2569 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.dll differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.pdb b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.pdb new file mode 100644 index 0000000..16146ce Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.pdb differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.xml b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.xml new file mode 100644 index 0000000..2b45edd --- /dev/null +++ b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/net451/Microsoft.IdentityModel.Logging.xml @@ -0,0 +1,398 @@ + + + + Microsoft.IdentityModel.Logging + + + + + Event source based logger to log different events. + + + + + Static logger that is exposed externally. An external application or framework can hook up a listener to this event source to log data in a custom way. + + + + + Flag which indicates whether or not PII is shown in logs. False by default. + + + + + String that is used in place of any arguments to log messages if the 'ShowPII' flag is set to false. + + + + + Indicates whether or the log message header (contains library version, date/time, and PII debugging information) has been written. + + + + + The log message that indicates the current library version. + + + + + The log message that indicates the date. + + + + + The log message that is shown when PII is off. + + + + + The log message that is shown when PII is off. + + + + + Writes an event log by using the provided string argument and current UTC time. + No level filtering is done on the event. + + The log message. + No level filtering. + + + + Writes an event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a verbose event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a verbose event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an information event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an information event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a warning event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a warning event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an error event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an error event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a critical event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a critical event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument and current UTC time. + + + + The log message. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument, arguments list and current UTC time. + + + + The log message. + An object array that contains zero or more objects to format. + + + + Minimum log level to log events. Default is Warning. + + + + + Helper class for logging. + + + + + Logs an exception using the event source logger and returns new exception. + + argument that is null or empty. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger. + + The exception to log. + + + + Logs an exception using the event source logger. + + Identifies the level of an event to be logged. + The exception to log. + + + + Logs an information event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a verbose event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a warning event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Formats the string using InvariantCulture + + Format string. + Format arguments. + Formatted string. + + + + Log messages and codes for Microsoft.IdentityModel.Logging + + + + + Event listener that writes logs to a file or a fileStream provided by user. + + + + + Name of the default log file, excluding its path. + + + + + Initializes a new instance of that writes logs to text file. + + + + + Initializes a new instance of that writes logs to text file. + + location of the file where log messages will be written. + + + + Initializes a new instance of that writes logs to text file. + + StreamWriter where logs will be written. + + + + Called whenever an event has been written by an event source for which the event listener has enabled events. + + + + + + Releases all resources used by the current instance of the class. + + + + diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.dll b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.dll new file mode 100644 index 0000000..522ee64 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.dll differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.pdb b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.pdb new file mode 100644 index 0000000..cc402f6 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.pdb differ diff --git a/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.xml b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.xml new file mode 100644 index 0000000..2b45edd --- /dev/null +++ b/packages/Microsoft.IdentityModel.Logging.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Logging.xml @@ -0,0 +1,398 @@ + + + + Microsoft.IdentityModel.Logging + + + + + Event source based logger to log different events. + + + + + Static logger that is exposed externally. An external application or framework can hook up a listener to this event source to log data in a custom way. + + + + + Flag which indicates whether or not PII is shown in logs. False by default. + + + + + String that is used in place of any arguments to log messages if the 'ShowPII' flag is set to false. + + + + + Indicates whether or the log message header (contains library version, date/time, and PII debugging information) has been written. + + + + + The log message that indicates the current library version. + + + + + The log message that indicates the date. + + + + + The log message that is shown when PII is off. + + + + + The log message that is shown when PII is off. + + + + + Writes an event log by using the provided string argument and current UTC time. + No level filtering is done on the event. + + The log message. + No level filtering. + + + + Writes an event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a verbose event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a verbose event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an information event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an information event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a warning event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a warning event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an error event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes an error event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes a critical event log by using the provided string argument and current UTC time. + + The log message. + + + + Writes a critical event log by using the provided string argument, current UTC time and the provided arguments list. + + The log message. + An object array that contains zero or more objects to format. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument and current UTC time. + + + + The log message. + + + + Writes an exception log by using the provided event identifer, exception argument, string argument, arguments list and current UTC time. + + + + The log message. + An object array that contains zero or more objects to format. + + + + Minimum log level to log events. Default is Warning. + + + + + Helper class for logging. + + + + + Logs an exception using the event source logger and returns new exception. + + argument that is null or empty. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + EventLevel is set to Error. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + message to log. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + message to log. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an argument exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger. + + The exception to log. + + + + Logs an exception using the event source logger. + + Identifies the level of an event to be logged. + The exception to log. + + + + Logs an information event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a verbose event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs a warning event. + + The log message. + An object array that contains zero or more objects to format. + + + + Logs an exception using the event source logger and returns new typed exception. + + Identifies the level of an event to be logged. + Identifies the argument whose value generated the ArgumentException. + the inner to be added to the outer exception. + Format string of the log message. + An object array that contains zero or more objects to format. + + + + Formats the string using InvariantCulture + + Format string. + Format arguments. + Formatted string. + + + + Log messages and codes for Microsoft.IdentityModel.Logging + + + + + Event listener that writes logs to a file or a fileStream provided by user. + + + + + Name of the default log file, excluding its path. + + + + + Initializes a new instance of that writes logs to text file. + + + + + Initializes a new instance of that writes logs to text file. + + location of the file where log messages will be written. + + + + Initializes a new instance of that writes logs to text file. + + StreamWriter where logs will be written. + + + + Called whenever an event has been written by an event source for which the event listener has enabled events. + + + + + + Releases all resources used by the current instance of the class. + + + + diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/.signature.p7s b/packages/Microsoft.IdentityModel.Protocols.5.2.4/.signature.p7s new file mode 100644 index 0000000..ec8fdb8 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/.signature.p7s differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/Microsoft.IdentityModel.Protocols.5.2.4.nupkg b/packages/Microsoft.IdentityModel.Protocols.5.2.4/Microsoft.IdentityModel.Protocols.5.2.4.nupkg new file mode 100644 index 0000000..e2c02a4 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/Microsoft.IdentityModel.Protocols.5.2.4.nupkg differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.dll b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.dll new file mode 100644 index 0000000..627ef7d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.dll differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.pdb b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.pdb new file mode 100644 index 0000000..c6965d7 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.pdb differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.xml b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.xml new file mode 100644 index 0000000..babe3ca --- /dev/null +++ b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net45/Microsoft.IdentityModel.Protocols.xml @@ -0,0 +1,310 @@ + + + + Microsoft.IdentityModel.Protocols + + + + + base class for authentication protocol messages. + + + + + Initializes a default instance of the class. + + + + + Builds a form post using the current IssuerAddress and the parameters that have been set. + + html with head set to 'Title', body containing a hiden from with action = IssuerAddress. + + + + Builds a Url using the current IssuerAddress and the parameters that have been set. + + UrlEncoded string. + Each parameter <Key, Value> is first transformed using . + + + + Returns a parameter. + + The parameter name. + The value of the parameter or null if the parameter does not exists. + If parameter is null + + + + Gets or sets the issuer address. + + If the 'value' is null. + + + + Gets the message parameters as a Dictionary. + + + + + Gets or sets the title used when constructing the post string. + + If the 'value' is null. + + + + Removes a parameter. + + The parameter name. + If 'parameter' is null or empty. + + + + Sets a parameter to the Parameters Dictionary. + + The parameter name. + The value to be assigned to parameter. + If 'parameterName' is null or empty. + If null is passed as value and the parameter exists, that parameter is removed. + + + + Sets a collection parameters. + + + + + + Gets or sets the script button text used when constructing the post string. + + If the 'value' is null. + + + + Gets or sets the text used when constructing the post string that will be displayed to used if script is disabled. + + If the 'value' is null. + + + + Manages the retrieval of Configuration data. + + The type of . + + + + 1 day is the default time interval that afterwards, will obtain new configuration. + + + + + 30 seconds is the default time interval that must pass for to obtain a new configuration. + + + + + 5 minutes is the minimum value for automatic refresh. can not be set less than this value. + + + + + 1 second is the minimum time interval that must pass for to obtain new configuration. + + + + + Static initializer for a new object. Static initializers run before the first instance of the type is created. + + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The client to use when obtaining configuration. + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The that reaches out to obtain the configuration. + If 'metadataAddress' is null or empty. + If 'configRetriever' is null. + If 'docRetriever' is null. + + + + Gets or sets the that controls how often an automatic metadata refresh should occur. + + + + + The minimum time between retrievals, in the event that a retrieval failed, or that a refresh was explicitly requested. + + + + + Obtains an updated version of Configuration. + + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Obtains an updated version of Configuration. + + CancellationToken + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Requests that then next call to obtain new configuration. + If the last refresh was greater than then the next call to will retrieve new configuration. + If == then this method does nothing. + + + + + Reads a local file from the disk. + + + + + Initializes a new instance of the class. + + + + + Reads a document using . + + Fully qualified path to a file. + not used. + UTF8 decoding of bytes in the file. + If address is null or whitespace. + with inner expection containing the original exception. + + + + Retrieves metadata information using HttpClient. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified httpClient. + + + 'httpClient' is null. + + + + Requires Https secure channel for sending requests.. This is turned ON by default for security reasons. It is RECOMMENDED that you do not allow retrieval from http addresses by default. + + + + + Returns a task which contains a string converted from remote document when completed, by using the provided address. + + Location of document + A cancellation token that can be used by other objects or threads to receive notice of cancellation. + Document as a string + + + + Interface that defines a model for retrieving configuration data. + + The type of . + + + + Retrieve the current configuration, refreshing and/or caching as needed. + This method will throw if the configuration cannot be retrieved, instead of returning null. + + + + + + + Indicate that the configuration may be stale (as indicated by failing to process incoming tokens). + + + + + Interface that defines methods to retrieve configuration. + + The type of the configuration metadata. + + + + Retrieves a populated configuration given an address and an . + + Address of the discovery document. + The to use to read the discovery document. + A cancellation token that can be used by other objects or threads to receive notice of cancellation. . + + + + Interface that defines a document retriever that returns the document as a string. + + + + + Obtains a document from an address. + + location of document. + . + document as a string. + + + + This type is for users that want a fixed and static Configuration. + In this case, the configuration is obtained and passed to the constructor. + + must be a class. + + + + Initializes an new instance of with a Configuration instance. + + Configuration of type OpenIdConnectConfiguration or OpenIdConnectConfiguration. + + + + Obtains an updated version of Configuration. + + . + Configuration of type T. + + + + For the this type, this is a no-op + + + + + Log messages and codes + + + + + Represents X509Certificate validation mode. + + + + diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.dll b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.dll new file mode 100644 index 0000000..e31ce18 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.dll differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.pdb b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.pdb new file mode 100644 index 0000000..c6965d7 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.pdb differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.xml b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.xml new file mode 100644 index 0000000..babe3ca --- /dev/null +++ b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/net451/Microsoft.IdentityModel.Protocols.xml @@ -0,0 +1,310 @@ + + + + Microsoft.IdentityModel.Protocols + + + + + base class for authentication protocol messages. + + + + + Initializes a default instance of the class. + + + + + Builds a form post using the current IssuerAddress and the parameters that have been set. + + html with head set to 'Title', body containing a hiden from with action = IssuerAddress. + + + + Builds a Url using the current IssuerAddress and the parameters that have been set. + + UrlEncoded string. + Each parameter <Key, Value> is first transformed using . + + + + Returns a parameter. + + The parameter name. + The value of the parameter or null if the parameter does not exists. + If parameter is null + + + + Gets or sets the issuer address. + + If the 'value' is null. + + + + Gets the message parameters as a Dictionary. + + + + + Gets or sets the title used when constructing the post string. + + If the 'value' is null. + + + + Removes a parameter. + + The parameter name. + If 'parameter' is null or empty. + + + + Sets a parameter to the Parameters Dictionary. + + The parameter name. + The value to be assigned to parameter. + If 'parameterName' is null or empty. + If null is passed as value and the parameter exists, that parameter is removed. + + + + Sets a collection parameters. + + + + + + Gets or sets the script button text used when constructing the post string. + + If the 'value' is null. + + + + Gets or sets the text used when constructing the post string that will be displayed to used if script is disabled. + + If the 'value' is null. + + + + Manages the retrieval of Configuration data. + + The type of . + + + + 1 day is the default time interval that afterwards, will obtain new configuration. + + + + + 30 seconds is the default time interval that must pass for to obtain a new configuration. + + + + + 5 minutes is the minimum value for automatic refresh. can not be set less than this value. + + + + + 1 second is the minimum time interval that must pass for to obtain new configuration. + + + + + Static initializer for a new object. Static initializers run before the first instance of the type is created. + + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The client to use when obtaining configuration. + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The that reaches out to obtain the configuration. + If 'metadataAddress' is null or empty. + If 'configRetriever' is null. + If 'docRetriever' is null. + + + + Gets or sets the that controls how often an automatic metadata refresh should occur. + + + + + The minimum time between retrievals, in the event that a retrieval failed, or that a refresh was explicitly requested. + + + + + Obtains an updated version of Configuration. + + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Obtains an updated version of Configuration. + + CancellationToken + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Requests that then next call to obtain new configuration. + If the last refresh was greater than then the next call to will retrieve new configuration. + If == then this method does nothing. + + + + + Reads a local file from the disk. + + + + + Initializes a new instance of the class. + + + + + Reads a document using . + + Fully qualified path to a file. + not used. + UTF8 decoding of bytes in the file. + If address is null or whitespace. + with inner expection containing the original exception. + + + + Retrieves metadata information using HttpClient. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified httpClient. + + + 'httpClient' is null. + + + + Requires Https secure channel for sending requests.. This is turned ON by default for security reasons. It is RECOMMENDED that you do not allow retrieval from http addresses by default. + + + + + Returns a task which contains a string converted from remote document when completed, by using the provided address. + + Location of document + A cancellation token that can be used by other objects or threads to receive notice of cancellation. + Document as a string + + + + Interface that defines a model for retrieving configuration data. + + The type of . + + + + Retrieve the current configuration, refreshing and/or caching as needed. + This method will throw if the configuration cannot be retrieved, instead of returning null. + + + + + + + Indicate that the configuration may be stale (as indicated by failing to process incoming tokens). + + + + + Interface that defines methods to retrieve configuration. + + The type of the configuration metadata. + + + + Retrieves a populated configuration given an address and an . + + Address of the discovery document. + The to use to read the discovery document. + A cancellation token that can be used by other objects or threads to receive notice of cancellation. . + + + + Interface that defines a document retriever that returns the document as a string. + + + + + Obtains a document from an address. + + location of document. + . + document as a string. + + + + This type is for users that want a fixed and static Configuration. + In this case, the configuration is obtained and passed to the constructor. + + must be a class. + + + + Initializes an new instance of with a Configuration instance. + + Configuration of type OpenIdConnectConfiguration or OpenIdConnectConfiguration. + + + + Obtains an updated version of Configuration. + + . + Configuration of type T. + + + + For the this type, this is a no-op + + + + + Log messages and codes + + + + + Represents X509Certificate validation mode. + + + + diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.dll b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.dll new file mode 100644 index 0000000..1379fc0 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.dll differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.pdb b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.pdb new file mode 100644 index 0000000..981ec6b Binary files /dev/null and b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.pdb differ diff --git a/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.xml b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.xml new file mode 100644 index 0000000..babe3ca --- /dev/null +++ b/packages/Microsoft.IdentityModel.Protocols.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Protocols.xml @@ -0,0 +1,310 @@ + + + + Microsoft.IdentityModel.Protocols + + + + + base class for authentication protocol messages. + + + + + Initializes a default instance of the class. + + + + + Builds a form post using the current IssuerAddress and the parameters that have been set. + + html with head set to 'Title', body containing a hiden from with action = IssuerAddress. + + + + Builds a Url using the current IssuerAddress and the parameters that have been set. + + UrlEncoded string. + Each parameter <Key, Value> is first transformed using . + + + + Returns a parameter. + + The parameter name. + The value of the parameter or null if the parameter does not exists. + If parameter is null + + + + Gets or sets the issuer address. + + If the 'value' is null. + + + + Gets the message parameters as a Dictionary. + + + + + Gets or sets the title used when constructing the post string. + + If the 'value' is null. + + + + Removes a parameter. + + The parameter name. + If 'parameter' is null or empty. + + + + Sets a parameter to the Parameters Dictionary. + + The parameter name. + The value to be assigned to parameter. + If 'parameterName' is null or empty. + If null is passed as value and the parameter exists, that parameter is removed. + + + + Sets a collection parameters. + + + + + + Gets or sets the script button text used when constructing the post string. + + If the 'value' is null. + + + + Gets or sets the text used when constructing the post string that will be displayed to used if script is disabled. + + If the 'value' is null. + + + + Manages the retrieval of Configuration data. + + The type of . + + + + 1 day is the default time interval that afterwards, will obtain new configuration. + + + + + 30 seconds is the default time interval that must pass for to obtain a new configuration. + + + + + 5 minutes is the minimum value for automatic refresh. can not be set less than this value. + + + + + 1 second is the minimum time interval that must pass for to obtain new configuration. + + + + + Static initializer for a new object. Static initializers run before the first instance of the type is created. + + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The client to use when obtaining configuration. + + + + Instantiaties a new that manages automatic and controls refreshing on configuration data. + + The address to obtain configuration. + The + The that reaches out to obtain the configuration. + If 'metadataAddress' is null or empty. + If 'configRetriever' is null. + If 'docRetriever' is null. + + + + Gets or sets the that controls how often an automatic metadata refresh should occur. + + + + + The minimum time between retrievals, in the event that a retrieval failed, or that a refresh was explicitly requested. + + + + + Obtains an updated version of Configuration. + + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Obtains an updated version of Configuration. + + CancellationToken + Configuration of type T. + If the time since the last call is less than then is not called and the current Configuration is returned. + + + + Requests that then next call to obtain new configuration. + If the last refresh was greater than then the next call to will retrieve new configuration. + If == then this method does nothing. + + + + + Reads a local file from the disk. + + + + + Initializes a new instance of the class. + + + + + Reads a document using . + + Fully qualified path to a file. + not used. + UTF8 decoding of bytes in the file. + If address is null or whitespace. + with inner expection containing the original exception. + + + + Retrieves metadata information using HttpClient. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified httpClient. + + + 'httpClient' is null. + + + + Requires Https secure channel for sending requests.. This is turned ON by default for security reasons. It is RECOMMENDED that you do not allow retrieval from http addresses by default. + + + + + Returns a task which contains a string converted from remote document when completed, by using the provided address. + + Location of document + A cancellation token that can be used by other objects or threads to receive notice of cancellation. + Document as a string + + + + Interface that defines a model for retrieving configuration data. + + The type of . + + + + Retrieve the current configuration, refreshing and/or caching as needed. + This method will throw if the configuration cannot be retrieved, instead of returning null. + + + + + + + Indicate that the configuration may be stale (as indicated by failing to process incoming tokens). + + + + + Interface that defines methods to retrieve configuration. + + The type of the configuration metadata. + + + + Retrieves a populated configuration given an address and an . + + Address of the discovery document. + The to use to read the discovery document. + A cancellation token that can be used by other objects or threads to receive notice of cancellation. . + + + + Interface that defines a document retriever that returns the document as a string. + + + + + Obtains a document from an address. + + location of document. + . + document as a string. + + + + This type is for users that want a fixed and static Configuration. + In this case, the configuration is obtained and passed to the constructor. + + must be a class. + + + + Initializes an new instance of with a Configuration instance. + + Configuration of type OpenIdConnectConfiguration or OpenIdConnectConfiguration. + + + + Obtains an updated version of Configuration. + + . + Configuration of type T. + + + + For the this type, this is a no-op + + + + + Log messages and codes + + + + + Represents X509Certificate validation mode. + + + + diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/.signature.p7s b/packages/Microsoft.IdentityModel.Tokens.5.2.4/.signature.p7s new file mode 100644 index 0000000..fd534a2 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/.signature.p7s differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/Microsoft.IdentityModel.Tokens.5.2.4.nupkg b/packages/Microsoft.IdentityModel.Tokens.5.2.4/Microsoft.IdentityModel.Tokens.5.2.4.nupkg new file mode 100644 index 0000000..4d5e5f2 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/Microsoft.IdentityModel.Tokens.5.2.4.nupkg differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.dll b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.dll new file mode 100644 index 0000000..adb4f7d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.pdb b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.pdb new file mode 100644 index 0000000..c4f6477 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.xml b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.xml new file mode 100644 index 0000000..cccf5bd --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.xml @@ -0,0 +1,3018 @@ + + + + Microsoft.IdentityModel.Tokens + + + + + Base class for a Security Key that contains Asymmetric key material. + + + + + This must be overridden to get a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets the status of the private key. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Enum for the existence of private key + + + + + private key exists for sure + + + + + private key doesn't exist for sure + + + + + unable to determine the existence of private key + + + + + Provides signing and verifying operations when working with an + + + + + Mapping from algorithm to minimum .KeySize when creating signatures. + + + + + Mapping from algorithm to minimum .KeySize when verifying signatures. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + Whether this is required to create signatures then set this to true. + + Creating signatures requires that the has access to a private key. + Verifying signatures (the default), does not require access to the private key. + + 'key' is null. + + willCreateSignatures is true and .KeySize is less than the size corresponding to the given algorithm in . + + + .KeySize is less than the size corresponding to the algorithm in . Note: this is always checked. + + If and algorithm pair are not supported. + If the runtime is unable to create a suitable cryptographic provider. + + + + Gets the mapping from algorithm to the minimum .KeySize for creating signatures. + + + + + Gets the mapping from algorithm to the minimum .KeySize for verifying signatures. + + + + + Returns the algorithm name. + + The hash algorithm to use to create the hash value. + + + + Produces a signature over the 'input' using the and algorithm passed to . + + The bytes to be signed. + A signature over the input. + 'input' is null. + 'input.Length' == 0. + If has been called. + If the internal is null. This can occur if the constructor parameter 'willBeUsedforSigning' was not 'true'. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Validates that the asymmetric key size is more than the allowed minimum + + The asymmetric key to validate + Algorithm for which this key will be used + Whether they key will be used for creating signatures + + + + Verifies that a signature over the' input' matches the signature. + + The bytes to generate the signature over. + The value to verify against. + true if signature matches, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + If has been called. + If the internal is null. This can occur if a derived type does not call the base constructor. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Calls to release this managed resources. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Encodes and Decodes strings as Base64Url encoding. + + + + + The following functions perform base64url encoding which differs from regular base64 encoding as follows + * padding is skipped so the pad character '=' doesn't have to be percent encoded + * the 62nd and 63rd regular base64 encoding characters ('+' and '/') are replace with ('-' and '_') + The changes make the encoding alphabet file and URL safe. + + string to encode. + Base64Url encoding of the UTF8 bytes. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + An offset in inArray. + The number of elements of inArray to convert. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts the specified string, which encodes binary data as base-64-url digits, to an equivalent 8-bit unsigned integer array. + base64Url encoded string. + UTF8 bytes. + + + + Decodes the string from Base64UrlEncoded to UTF8. + + string to decode. + UTF8 string. + + + + Definition of cache for crypto providers + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + true if the was added, false if the cache already contained the + + + + Trys to find a in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + true if the was removed, false if the was not found. + + + + Creates cryptographic operators by specifying a 's and algorithms. + + + + + Returns the default instance. + + + + + Gets or sets the default value for caching + + + + + Static constructor that initializes the default . + + + + + Default constructor for . + + + + + Constructor that creates a deep copy of given object. + + to copy from. + + + + Gets the + + + + + Extensibility point for creating custom cryptographic operators. + + By default, if set, will be called before creating cryptographic operators. + If true is returned, then will be called. The will throw if the + Cryptographic operator returned is not of the correct type. + + + + Gets or sets a bool controlling if should be cached. + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + 'key' is not a . + 'algorithm, key' pair is not supported. + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates a that supports the and algorithm. + + The to use for signing. + The algorithm to use for signing. + 'key' is null. + 'algorithm' is null or empty. + ' is too small. + is too small. + is not a or a . + + AsymmetricSignatureProviders require access to a PrivateKey for Signing. + When finished with the call . + + + + + Returns a instance supports the and algorithm. + + The to use for signing. + The algorithm to use for verifying. + 'key' is null. + 'algorithm' is null or empty. + is too small. + is too small. + ' is not a or a . + When finished with the call . + + + + Returns a for a specific algorithm. + + the name of the hash algorithm to create. + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Returns a for a specific algorithm. + + the keyed hash algorithm to create. + bytes to use to create the Keyed Hash + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Answers if an algorithm is supported + + the name of the cryptographic algorithm + + + + + Checks if an 'algorithm, key' pair is supported. + + the algorithm to check. + the . + true if 'algorithm, key' pair is supported. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + Helper class for adding DateTimes and Timespans. + + + + + Add a DateTime and a TimeSpan. + The maximum time is DateTime.MaxTime. It is not an error if time + timespan > MaxTime. + Just return MaxTime. + + Initial value. + to add. + as the sum of time and timespan. + + + + Gets the Maximum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Gets the Minimum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Ensures that DataTime is UTC. + + to convert. + + + + + Ensures that DateTime is UTC. + + to convert. + + + + + Represents a ECDsa security key. + + + + + Returns a new instance of . + + + + + + instance used to initialize the key. + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets key size. + + + + + A wrapper class for properties that are used for token encryption. + + + + + Initializes a new instance of the class. + + + The key encryption algorithm to apply. + The encryption algorithm to apply. + + + + Gets the algorithm which used for token encryption. + + + + + Gets the algorithm which used for token encryption. + + + + + Users can override the default with this property. This factory will be used for creating encryition providers. + + + + + Gets the which used for signature valdiation. + + + + + Provides authenticated encryption and decryption services. + + + + + Initializes a new instance of the class used for encryption and decryption. + The that will be used for crypto operations. + The encryption algorithm to apply. + 'key' is null. + 'algorithm' is null or whitespace. + key size is not large enough. + 'algorithm' is not supported. + a symmetricSignatureProvider is not created. + + + + + Gets the encryption algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + initialization vector for encryption. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Decrypts ciphertext into plaintext + + the encrypted text to decrypt. + the authenticateData that is used in verification. + the initialization vector used when creating the ciphertext. + the authenticationTag that was created during the encyption. + decrypted ciphertext + 'ciphertext' is null or empty. + 'authenticatedData' is null or empty. + 'iv' is null or empty. + 'authenticationTag' is null or empty. + signature over authenticationTag fails to verify. + AES crypto operation threw. See inner exception. + + + + Checks if an 'key, algorithm' pair is supported + + the + the algorithm to check. + true if 'key, algorithm' pair is supported. + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Checks that the key has sufficient length + + that contains bytes. + the algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Contains the results of operation. + + + + + Initializes a new + + the used during + protected text. + the initialization vector used. + the bytes that need be passed to . + + + + Gets the . + + + + + Gets the Ciphertext. + + + + + Gets the initialization vector. + + + + + Gets the authentication tag + + + + + Provides Wrap key and Unwrap key services. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Unwrap a key. + + key to unwrap. + Unwrapped key. + + + + Wrap a key. + + the key to be wrapped + wrapped key. + + + + Provides RSA Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + Whether this is required to create decrypts then set this to true. + 'key' is null. + 'algorithm' is null. + The keysize doesn't match the algorithm. + If and algorithm pair are not supported. + Failed to create RSA algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Checks if an algorithm is supported. + + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using RSA decryption. + + the bytes to unwrap. + Unwrapped key + 'keyBytes' is null or length == 0. + If has been called. + Failed to unwrap the wrappedKey. + If the internal RSA algorithm is null. + + + + Wrap a key using RSA encryption. + + the key to be wrapped + A wrapped key + 'keyBytes' is null or has length == 0. + If has been called. + Failed to wrap the 'keyBytes'. + If the internal RSA algorithm is null. + + + + Provides Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + 'key' is null. + 'algorithm' is null. + If and algorithm pair are not supported. + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Returns the . + + + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + Answers if an algorithm is supported + + the + the algorithm to use + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using Symmmetric decryption. + + bytes to unwrap + Unwraped key + 'keyBytes' is null or length == 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to unwrap the wrappedKey. + + + + Wrap a key using Symmetric encryption. + + the key to be wrapped + The wrapped key result + 'keyBytes' is null or has length 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to wrap 'keyBytes'. + + + + Returns the absolute DateTime or the Seconds since Unix Epoch, where Epoch is UTC 1970-01-01T0:0:0Z. + + + + + DateTime as UTV for UnixEpoch + + + + + Per JWT spec: + Gets the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the desired date/time. + + The DateTime to convert to seconds. + if dateTimeUtc less than UnixEpoch, return 0 + the number of seconds since Unix Epoch. + + + + Creates a DateTime from epoch time. + + Number of seconds. + The DateTime in UTC. + + + + Represents a security token exception when decryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Represents a security token exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime + when decrypting a token. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Throw this exception when a received Security Token has expiration time in the past. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when 'audience' of a token was not valid. + + + + + Gets or sets the InvalidAudience that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'issuer' of a token was not valid. + + + + + Gets or sets the InvalidIssuer that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'lifetime' of a token was not valid. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'signature' of a token was not valid. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has an invalid issuer signing key. + + + + + Gets or sets the SigningKey that was found invalid. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Represents a key wrap exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security token has an effective time + in the future. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when an add to the TokenReplayCache fails. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has been replayed. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Provides extensibility for cryptographic operators. + If custom operators are needed for then can be set to + return these operators. will be before each creation. + + + + + Called to determine if a cryptographic operation is supported. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + true if supported + + + + returns a cryptographic operator that supports the algorithm. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + call when finished with the object. + + + + called to release the object returned from + + the object returned from . + + + + Defines a cache for crypto providers. + Current support is limited to only. + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + if signatureProvider is null. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + if signatureProvider is null. + true if the was added, false if the cache already contained the + if the is added will be set to 'this'. + + + + Trys to find a to this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + if signatureProvider is null. + true if the was removed, false if the was not found. + if the is removed will be set to null. + + + + ISecurityTokenValidator + + + + + Returns true if the token can be read, false otherwise. + + + + + Returns true if a token can be validated. + + + + + Gets and sets the maximum size in bytes, that a will be processed. + + + + + Validates a token passed as a string using + + + + + Interface that defines a simple cache for tacking replaying of security tokens. + + + + + Try to add a securityToken. + + the security token to add. + the time when security token expires. + true if the security token was successfully added. + + + + Try to find securityToken + + the security token to find. + true if the security token is found. + + + + Constants for JsonWebAlgorithms "kty" Key Type (sec 6.1) + http://tools.ietf.org/html/rfc7518#section-6.1 + + + + + Represents a JSON Web Key as defined in http://tools.ietf.org/html/rfc7517. + + + + + Magic numbers identifying ECDSA blob types + + + + + Returns a new instance of . + + A string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + A string that contains JSON Web Key parameters in JSON format. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets or sets the 'alg' (KeyType).. + + + + + Gets or sets the 'crv' (ECC - Curve).. + + + + + Gets or sets the 'd' (ECC - Private Key OR RSA - Private Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dp' (RSA - First Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dq' (RSA - Second Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'e' (RSA - Exponent).. + + + + + Gets or sets the 'k' (Symmetric - Key Value).. + + Base64urlEncoding + + + + Gets the key id of this . + + + + + Gets the 'key_ops' (Key Operations).. + + + + + Gets or sets the 'kid' (Key ID).. + + + + + Gets or sets the 'kty' (Key Type).. + + + + + Gets or sets the 'n' (RSA - Modulus).. + + Value is formated as: Base64urlEncoding + + + + Gets or sets the 'oth' (RSA - Other Primes Info).. + + + + + Gets or sets the 'p' (RSA - First Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'q' (RSA - Second Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'qi' (RSA - First CRT Coefficient).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'use' (Public Key Use).. + + + + + Gets or sets the 'x' (ECC - X Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the 'x5c' collection (X.509 Certificate Chain).. + + + + + Gets or sets the 'x5t' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5t#S256' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5u' (X.509 URL).. + + + + + Gets or sets the 'y' (ECC - Y Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the key size of . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets a bool that determines if the 'key_ops' (Key Operations) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'key_ops' (Key Operations) is not empty; otherwise, false. + + + + Gets a bool that determines if the 'x5c' collection (X.509 Certificate Chain) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'x5c' collection (X.509 Certificate Chain) is not empty; otherwise, false. + + + + Returns the size of key in bytes + + Represents ecdsa curve -P256, P384, P521 + Size of the key in bytes + + + + Returns the size of key in bits. + + Represents ecdsa curve -P256, P384, P512 + Size of the key in bits. + + + + Returns the magic value representing the curve corresponding to the curve id. + + Represents ecdsa curve -P256, P384, P512 + Whether the provider will create signatures or not + Uint representing the magic number + + + + Json web key converter + + + + + Convert security key into json web key. + + Security Key + json web key + + + + Convert RSA security key into json web key. + + RSA security key + json web key + + + + Convert X509 security key into json web key. + + X509 security key + json web key + + + + Convert Symmetric security key into json web key. + + Symmetric security key + json web key + + + + Constants for JsonWebKey Elliptical Curve Types + https://tools.ietf.org/html/rfc7518#section-6.2.1.1 + + + + + Names for Json Web Key Values + + + + + Contains a collection of that can be populated from a json string. + + provides support for http://tools.ietf.org/html/rfc7517. + + + + Returns a new instance of . + + a string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + a json string containing values. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of from a json string. + + a json string containing values. + jsonSerializerSettings + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets the . + + + + + Returns the JsonWebKeys as a . + + + + + Names for Json Web Key Set Values + + + + + Constants for JsonWebKeyUse (sec 4.2) + http://tools.ietf.org/html/rfc7517#section-4 + + + + + Log messages and codes + + + + + + + + + + + + + Detects if RSACng is available + + + + + + The purpose of this class is to ensure that we obtain an RsaCryptoServiceProvider that supports SHA-256 signatures. + If the original RsaCryptoServiceProvider doesn't support SHA-256, we create a new one using the same KeyContainer. + + + + + Initializes an new instance of . + + + + + + Destructs the instance. + + + + + Releases all resources used by the current instance of the class. + + + + + Decrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be decrypted. + true to perform direct System.Security.Cryptography.RSA decryption using OAEP padding (only available on a computer running Microsoft Windows XP or later);o + therwise, false to use PKCS#1 v1.5 padding. + + + + + Encrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be encrypted. + true to perform direct System.Security.Cryptography.RSA encryption using OAEP padding (only available on a computer running Microsoft Windows XP or later); + otherwise, false to use PKCS#1 v1.5 padding. + + + + + Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. + + The input byte array for which to compute the hash. + The hash algorithm to use to create the hash value. + The Signature for the specified data. + + + + Verifies that a digital signature is valid by determining the hash value in the signature using the provided public key and comparing it to the hash value of the provided data. + + The input byte array. + The hash algorithm to use to create the hash value. + The signature byte array to be verified. + true if the signature is valid; otherwise, false. + + + + Represents a Rsa security key. + + + + + Initializes a new instance of the class. + + + + + + Initializes a new instance of the class. + + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets RSA key size. + + + + + used to initialize the key. + + + + + instance used to initialize the key. + + + + + Constants for Security Algorithm. + + + + + Base class for Security Key. + + + + + This must be overridden to get the size of this . + + + + + Gets the key id of this . + + + + + Gets or sets . + + + + + Contains information about the keys inside the tokens. + + + + + Base class for security token. + + + + + This must be overridden to get the Id of this . + + + + + This must be overridden to get the issuer of this . + + + + + This must be overridden to get the . + + + + + This must be overridden to get or set the that signed this instance. + + .ValidateToken(...) can this value when a is used to successfully validate a signature. + + + + This must be overridden to get the time when this was Valid. + + + + + This must be overridden to get the time when this is no longer Valid. + + + + + Contains some information which used to create a security token. + + + + + Gets or sets the value of the 'audience' claim. + + + + + Gets or sets the used to create a encrypted security token. + + + + + Gets or sets the value of the 'expiration' claim. + + + + + Gets or sets the issuer of this . + + + + + Gets or sets the time the security token was issued. + + + + + Gets or sets the notbefore time for the security token. + + + + + Gets or sets the used to create a security token. + + + + + Gets or sets the . + + + + + Defines the interface for a Security Token Handler. + + + + + Creates an instance of + + + + + Returns . + + + true if attached; otherwise, false. + + + + Returns . + + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'True' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize token handled + by this instance. + + true if the WriteToken method can serialize this token. + + + + This must be overridden to get the System.Type of the SecurityToken this instance handles. + + + + + Indicates whether the current token string can be read as a token + of the type handled by this instance. + + The token string thats needs to be read. + 'True' if the ReadToken method can parse the token string. + + + + Gets and sets the maximum token size in bytes that will be processed. + + 'value' less than 1. + + + + Deserializes from string a token of the type handled by this instance. + + The string to be deserialized. + SecurityToken instance which represents the serialized token. + + + + Gets security token. + + . + SecurityToken instance which represents the serialized token. + + + + Serializes to string a token of the type handled by this instance. + + A token of type TokenType. + The serialized token. + + + + This must be overridden to serialize to XML a token of the type handled by this instance. + + The XML writer. + A token of type . + + + + This must be overridden to deserialize token with the provided . + + . + the current . + SecurityToken instance which represents the serialized token. + + + + This must be overridden to validate a token passed as a string using + + A token of type . + the current . + The token of type that was validated. + + + + Provides signature services, signing and verifying. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + 'key' is null. + 'algorithm' is null or empty. + + + + Gets the signature algorithm. + + + + + Gets or sets a user context for a . + + + + + Gets or sets the that is associated with this + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Gets the . + + + + + This must be overridden to produce a signature over the 'input'. + + bytes to sign. + signed bytes + + + + This must be overridden to verify a signature created over the 'input'. + + bytes to verify. + signature to compare against. + true if the computed signature matches the signature parameter, false otherwise. + + + + Gets or sets a bool indicating if this is expected to create signatures. + + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + The digest algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + if 'digest' is null or empty. + + + + Gets the signature algorithm. + + if 'value' is null or empty. + + + + Gets the digest algorithm. + + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + This will have precedence over + + + + Gets the used for signature creation or validation. + + + + + Gets the key id associated with . + + + + + Represents a symmetric security key. + + + + + Returns a new instance of instance. + + The byte array of the key. + + + + Gets the key size. + + + + + Gets the byte array of the key. + + + + + Provides signing and verifying operations using a and specifying an algorithm. + + + + + This is the minimum .KeySize when creating and verifying signatures. + + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + indicates if this will be used to create signatures. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Gets or sets the minimum .KeySize"/>. + + 'value' is smaller than . + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Returns the . + + The hash algorithm to use to create the hash value. + The byte array of the key. + + + + + Gets the for this . + + + + + Produces a signature over the 'input' using the and 'algorithm' passed to . + + The bytes to sign. + Signed bytes + 'input' is null. + 'input.Length' == 0. + has been called. + is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + number of bytes of signature to use. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + 'length < 1' + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Definition for AudienceValidator. + + The audiences found in the . + The being validated. + required for validation. + true if the audience is considered valid. + + + + Definition for IssuerSigningKeyResolver. + + The representation of the token that is being validated. + The that is being validated. It may be null. + A key identifier. It may be null. + required for validation. + A to use when validating a signature. + + + + Definition for IssuerSigningKeyValidator. + + The that signed the . + The being validated. + required for validation. + + + + Definition for IssuerValidator. + + The issuer to validate. + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + The delegate should return a non null string that represents the 'issuer'. If null a default value will be used. + + + + Definition for LifetimeValidator. + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + + + + Definition for TokenReplayValidator. + + The 'expiration' time found in the . + The being validated. + required for validation. + + + + + Definition for SignatureValidator. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenReader. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenDecryptionKeyResolver. + + The representation of the token to be decrypted. + The to be decrypted. The runtime by default passes null. + A key identifier. It may be null. + required for validation. + A to use when decrypting the token. + + + + Contains a set of parameters that are used by a when validating a . + + + + + This is the fallback authenticationtype that a will use if nothing is set. + + + + + Default for the clock skew. + + 300 seconds (5 minutes). + + + + Default for the maximm token size. + + 2 MB (mega bytes). + + + + Copy constructor for . + + + + + Initializes a new instance of the class. + + + + + Gets or sets . + + + + + Gets or sets a delegate that will be used to validate the audience. + + + If set, this delegate will be called to validate the 'audience' instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to read the token. + + + If set, this delegate will be called to read the token instead of normal processing. + + + + + Gets or sets the AuthenticationType when creating a . + + If 'value' is null or whitespace. + + + + Gets or sets the clock skew to apply when validating a time. + + If 'value' is less than 0. + + + + Returns a new instance of with values copied from this object. + + A new object copied from this object + This is a shallow Clone. + + + + Creates a using: + + 'NameClaimType': If NameClaimTypeRetriever is set, call delegate, else call NameClaimType. If the result is a null or empty string, use . + 'RoleClaimType': If RoleClaimTypeRetriever is set, call delegate, else call RoleClaimType. If the result is a null or empty string, use . + + A with Authentication, NameClaimType and RoleClaimType set. + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + + + + Gets or sets the that is to be used for decryption. + + + + + Gets or sets a delegate that will be called to retreive a used for decryption. + + + This will be used to decrypt the token. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets a delegate for validating the that signed the token. + + + If set, this delegate will be called to validate the that signed the token, instead of normal processing. + + + + + Gets or sets the that is to be used for signature validation. + + + + + Gets or sets a delegate that will be called to retrieve a used for signature validation. + + + This will be used to check the signature. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets an used for signature validation. + + + + + Gets or sets a delegate that will be used to validate the issuer of the token. + + + If set, this delegate will be called to validate the 'issuer' of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the lifetime of the token + + + If set, this delegate will be called to validate the lifetime of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the token replay of the token + + + If set, this delegate will be called to validate the token replay of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a that defines the . + + + Controls the value returns. It will return the first where the equals . + + + + + Gets or sets the that defines the . + + + Controls the results of . + Each where == will be checked for a match against the 'string' passed to . + + + + + Gets or sets a delegate that will be called to obtain the NameClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a value indicating whether tokens must have an 'expiration' value. + + + + + Gets or sets a value indicating whether a can be considered valid if not signed. + + + + + Gets or sets a delegate that will be called to obtain the RoleClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a boolean to control if the original token should be saved after the security token is validated. + + The runtime will consult this value and save the original token that was validated. + + + + Gets or sets a delegate that will be used to validate the signature of the token. + + + If set, this delegate will be called to signature of the token, instead of normal processing. + + + + + Gets or sets the that is to be used for decrypting inbound tokens. + + + + + Gets or set the that store tokens that can be checked to help detect token replay. + + If set, then tokens must have an expiration time or the runtime will fault. + + + + Gets or sets a value indicating if an actor token is detected, whether it should be validated. + + + + + Gets or sets a boolean to control if the audience will be validated during token validation. + + Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. + A forwarded token would contain the audience of the original site. + + + + Gets or sets a boolean to control if the issuer will be validated during token validation. + + + Validation of the issuer mitigates forwarding attacks that can occur when an + IdentityProvider represents multiple tenants and signs tokens with the same keys. + It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from + contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. A application that accepts tokens from fabrikam could forward them + to the application that accepts tokens for contoso. + + + + + Gets or sets a boolean to control if the lifetime will be validated during token validation. + + + + + Gets or sets a boolean that controls if validation of the that signed the securityToken is called. + + It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, + which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. + + + + Gets or sets a boolean to control if the token replay will be validated during token validation. + + + + + Gets or sets a string that represents a valid audience that will be used to check against the token's audience. + + + + + Gets or sets the that contains valid audiences that will be used to check against the token's audience. + + + + + Gets or sets a that represents a valid issuer that will be used to check against the token's issuer. + + + + + Gets or sets the that contains valid issuers that will be used to check against the token's issuer. + + + + + Generates unique IDs. + + + + + Creates a unique ID suitable for use in an xml:id field. The value is + not hard to guess but is unique. + + The unique ID. + + + + Creates a unique ID similar to that created by CreateNonRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The unique ID, with the given prefix. + + + + Creates a unique, random ID suitable for use in an xml:id field. The + value is hard to guess and unique. + + The unique ID. + + + + Creates a unique, random ID similar to that created by CreateRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The random URI. + + + + Creates a unique, random ID suitable for use as a URI. The value is + hard to guess and unique. The URI is in the urn:uuid: namespace. + + The random URI. + + + + Contains some utility methods. + + + + + A string with "empty" value. + + + + + A string with "null" value. + + + + + Creates a copy of the byte array. + + The resource array. + A copy of the byte array. + + + + Serializes the list of strings into string as follows: + 'str1','str2','str3' ... + + + The strings used to build a comma delimited string. + + + The single . + + + + + Returns whether the input string is https. + + The input string. + true if the input string is https; otherwise, false. + + + + Returns whether the input uri is https. + + . + true if the input uri is https; otherwise, false. + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + + true if the bytes are equal, false otherwise. + + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + length of array to check + + true if the bytes are equal, false otherwise. + + + + + AudienceValidator + + + + + Determines if the audiences found in a are valid. + + The audiences found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'audiences' is null and is true. + If is null or whitespace and is null. + If none of the 'audiences' matched either or one of . + An EXACT match is required. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + If 'vaidationParameters' is null. + If 'issuer' is null or whitespace and is true. + If is null or whitespace and is null. + If 'issuer' failed to matched either or one of . + An EXACT match is required. + + + + Validates the that signed a . + + The that signed the . + The being validated. + required for validation. + if 'securityKey' is null and ValidateIssuerSigningKey is true. + if 'securityToken' is null and ValidateIssuerSigningKey is true. + if 'vaidationParameters' is null. + + + + Validates the lifetime of a . + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'expires.HasValue' is false and is true. + If 'notBefore' is > 'expires'. + If 'notBefore' is > DateTime.UtcNow. + If 'expires' is < DateTime.UtcNow. + All time comparisons apply . + + + + Validates if a token has been replayed. + + When does the security token expire. + The being validated. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Validates if a token has been replayed. + + The being validated. + When does the security token expire. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Security key that allows access to cert + + + + + Instantiates a using a + + The cert to use. + + + + Gets the key size. + + + + + Gets the X5t of this . + + + + + Returns the private key from the . + + + + + Gets the public key from the . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets the . + + + + + Returns a bool indicating if this key is equivalent to another key. + + true if the keys are equal; otherwise, false. + + + + Returns an int hash code. + + An int hash code + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + + + + Initializes a new instance of the class. + + A that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Gets the used by this instance. + + + + diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.dll b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.dll new file mode 100644 index 0000000..4d3eb7c Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.pdb b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.pdb new file mode 100644 index 0000000..128b374 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.xml b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.xml new file mode 100644 index 0000000..cccf5bd --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.xml @@ -0,0 +1,3018 @@ + + + + Microsoft.IdentityModel.Tokens + + + + + Base class for a Security Key that contains Asymmetric key material. + + + + + This must be overridden to get a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets the status of the private key. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Enum for the existence of private key + + + + + private key exists for sure + + + + + private key doesn't exist for sure + + + + + unable to determine the existence of private key + + + + + Provides signing and verifying operations when working with an + + + + + Mapping from algorithm to minimum .KeySize when creating signatures. + + + + + Mapping from algorithm to minimum .KeySize when verifying signatures. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + Whether this is required to create signatures then set this to true. + + Creating signatures requires that the has access to a private key. + Verifying signatures (the default), does not require access to the private key. + + 'key' is null. + + willCreateSignatures is true and .KeySize is less than the size corresponding to the given algorithm in . + + + .KeySize is less than the size corresponding to the algorithm in . Note: this is always checked. + + If and algorithm pair are not supported. + If the runtime is unable to create a suitable cryptographic provider. + + + + Gets the mapping from algorithm to the minimum .KeySize for creating signatures. + + + + + Gets the mapping from algorithm to the minimum .KeySize for verifying signatures. + + + + + Returns the algorithm name. + + The hash algorithm to use to create the hash value. + + + + Produces a signature over the 'input' using the and algorithm passed to . + + The bytes to be signed. + A signature over the input. + 'input' is null. + 'input.Length' == 0. + If has been called. + If the internal is null. This can occur if the constructor parameter 'willBeUsedforSigning' was not 'true'. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Validates that the asymmetric key size is more than the allowed minimum + + The asymmetric key to validate + Algorithm for which this key will be used + Whether they key will be used for creating signatures + + + + Verifies that a signature over the' input' matches the signature. + + The bytes to generate the signature over. + The value to verify against. + true if signature matches, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + If has been called. + If the internal is null. This can occur if a derived type does not call the base constructor. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Calls to release this managed resources. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Encodes and Decodes strings as Base64Url encoding. + + + + + The following functions perform base64url encoding which differs from regular base64 encoding as follows + * padding is skipped so the pad character '=' doesn't have to be percent encoded + * the 62nd and 63rd regular base64 encoding characters ('+' and '/') are replace with ('-' and '_') + The changes make the encoding alphabet file and URL safe. + + string to encode. + Base64Url encoding of the UTF8 bytes. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + An offset in inArray. + The number of elements of inArray to convert. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts the specified string, which encodes binary data as base-64-url digits, to an equivalent 8-bit unsigned integer array. + base64Url encoded string. + UTF8 bytes. + + + + Decodes the string from Base64UrlEncoded to UTF8. + + string to decode. + UTF8 string. + + + + Definition of cache for crypto providers + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + true if the was added, false if the cache already contained the + + + + Trys to find a in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + true if the was removed, false if the was not found. + + + + Creates cryptographic operators by specifying a 's and algorithms. + + + + + Returns the default instance. + + + + + Gets or sets the default value for caching + + + + + Static constructor that initializes the default . + + + + + Default constructor for . + + + + + Constructor that creates a deep copy of given object. + + to copy from. + + + + Gets the + + + + + Extensibility point for creating custom cryptographic operators. + + By default, if set, will be called before creating cryptographic operators. + If true is returned, then will be called. The will throw if the + Cryptographic operator returned is not of the correct type. + + + + Gets or sets a bool controlling if should be cached. + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + 'key' is not a . + 'algorithm, key' pair is not supported. + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates a that supports the and algorithm. + + The to use for signing. + The algorithm to use for signing. + 'key' is null. + 'algorithm' is null or empty. + ' is too small. + is too small. + is not a or a . + + AsymmetricSignatureProviders require access to a PrivateKey for Signing. + When finished with the call . + + + + + Returns a instance supports the and algorithm. + + The to use for signing. + The algorithm to use for verifying. + 'key' is null. + 'algorithm' is null or empty. + is too small. + is too small. + ' is not a or a . + When finished with the call . + + + + Returns a for a specific algorithm. + + the name of the hash algorithm to create. + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Returns a for a specific algorithm. + + the keyed hash algorithm to create. + bytes to use to create the Keyed Hash + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Answers if an algorithm is supported + + the name of the cryptographic algorithm + + + + + Checks if an 'algorithm, key' pair is supported. + + the algorithm to check. + the . + true if 'algorithm, key' pair is supported. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + Helper class for adding DateTimes and Timespans. + + + + + Add a DateTime and a TimeSpan. + The maximum time is DateTime.MaxTime. It is not an error if time + timespan > MaxTime. + Just return MaxTime. + + Initial value. + to add. + as the sum of time and timespan. + + + + Gets the Maximum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Gets the Minimum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Ensures that DataTime is UTC. + + to convert. + + + + + Ensures that DateTime is UTC. + + to convert. + + + + + Represents a ECDsa security key. + + + + + Returns a new instance of . + + + + + + instance used to initialize the key. + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets key size. + + + + + A wrapper class for properties that are used for token encryption. + + + + + Initializes a new instance of the class. + + + The key encryption algorithm to apply. + The encryption algorithm to apply. + + + + Gets the algorithm which used for token encryption. + + + + + Gets the algorithm which used for token encryption. + + + + + Users can override the default with this property. This factory will be used for creating encryition providers. + + + + + Gets the which used for signature valdiation. + + + + + Provides authenticated encryption and decryption services. + + + + + Initializes a new instance of the class used for encryption and decryption. + The that will be used for crypto operations. + The encryption algorithm to apply. + 'key' is null. + 'algorithm' is null or whitespace. + key size is not large enough. + 'algorithm' is not supported. + a symmetricSignatureProvider is not created. + + + + + Gets the encryption algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + initialization vector for encryption. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Decrypts ciphertext into plaintext + + the encrypted text to decrypt. + the authenticateData that is used in verification. + the initialization vector used when creating the ciphertext. + the authenticationTag that was created during the encyption. + decrypted ciphertext + 'ciphertext' is null or empty. + 'authenticatedData' is null or empty. + 'iv' is null or empty. + 'authenticationTag' is null or empty. + signature over authenticationTag fails to verify. + AES crypto operation threw. See inner exception. + + + + Checks if an 'key, algorithm' pair is supported + + the + the algorithm to check. + true if 'key, algorithm' pair is supported. + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Checks that the key has sufficient length + + that contains bytes. + the algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Contains the results of operation. + + + + + Initializes a new + + the used during + protected text. + the initialization vector used. + the bytes that need be passed to . + + + + Gets the . + + + + + Gets the Ciphertext. + + + + + Gets the initialization vector. + + + + + Gets the authentication tag + + + + + Provides Wrap key and Unwrap key services. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Unwrap a key. + + key to unwrap. + Unwrapped key. + + + + Wrap a key. + + the key to be wrapped + wrapped key. + + + + Provides RSA Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + Whether this is required to create decrypts then set this to true. + 'key' is null. + 'algorithm' is null. + The keysize doesn't match the algorithm. + If and algorithm pair are not supported. + Failed to create RSA algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Checks if an algorithm is supported. + + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using RSA decryption. + + the bytes to unwrap. + Unwrapped key + 'keyBytes' is null or length == 0. + If has been called. + Failed to unwrap the wrappedKey. + If the internal RSA algorithm is null. + + + + Wrap a key using RSA encryption. + + the key to be wrapped + A wrapped key + 'keyBytes' is null or has length == 0. + If has been called. + Failed to wrap the 'keyBytes'. + If the internal RSA algorithm is null. + + + + Provides Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + 'key' is null. + 'algorithm' is null. + If and algorithm pair are not supported. + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Returns the . + + + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + Answers if an algorithm is supported + + the + the algorithm to use + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using Symmmetric decryption. + + bytes to unwrap + Unwraped key + 'keyBytes' is null or length == 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to unwrap the wrappedKey. + + + + Wrap a key using Symmetric encryption. + + the key to be wrapped + The wrapped key result + 'keyBytes' is null or has length 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to wrap 'keyBytes'. + + + + Returns the absolute DateTime or the Seconds since Unix Epoch, where Epoch is UTC 1970-01-01T0:0:0Z. + + + + + DateTime as UTV for UnixEpoch + + + + + Per JWT spec: + Gets the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the desired date/time. + + The DateTime to convert to seconds. + if dateTimeUtc less than UnixEpoch, return 0 + the number of seconds since Unix Epoch. + + + + Creates a DateTime from epoch time. + + Number of seconds. + The DateTime in UTC. + + + + Represents a security token exception when decryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Represents a security token exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime + when decrypting a token. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Throw this exception when a received Security Token has expiration time in the past. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when 'audience' of a token was not valid. + + + + + Gets or sets the InvalidAudience that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'issuer' of a token was not valid. + + + + + Gets or sets the InvalidIssuer that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'lifetime' of a token was not valid. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'signature' of a token was not valid. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has an invalid issuer signing key. + + + + + Gets or sets the SigningKey that was found invalid. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Represents a key wrap exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security token has an effective time + in the future. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when an add to the TokenReplayCache fails. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has been replayed. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Provides extensibility for cryptographic operators. + If custom operators are needed for then can be set to + return these operators. will be before each creation. + + + + + Called to determine if a cryptographic operation is supported. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + true if supported + + + + returns a cryptographic operator that supports the algorithm. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + call when finished with the object. + + + + called to release the object returned from + + the object returned from . + + + + Defines a cache for crypto providers. + Current support is limited to only. + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + if signatureProvider is null. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + if signatureProvider is null. + true if the was added, false if the cache already contained the + if the is added will be set to 'this'. + + + + Trys to find a to this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + if signatureProvider is null. + true if the was removed, false if the was not found. + if the is removed will be set to null. + + + + ISecurityTokenValidator + + + + + Returns true if the token can be read, false otherwise. + + + + + Returns true if a token can be validated. + + + + + Gets and sets the maximum size in bytes, that a will be processed. + + + + + Validates a token passed as a string using + + + + + Interface that defines a simple cache for tacking replaying of security tokens. + + + + + Try to add a securityToken. + + the security token to add. + the time when security token expires. + true if the security token was successfully added. + + + + Try to find securityToken + + the security token to find. + true if the security token is found. + + + + Constants for JsonWebAlgorithms "kty" Key Type (sec 6.1) + http://tools.ietf.org/html/rfc7518#section-6.1 + + + + + Represents a JSON Web Key as defined in http://tools.ietf.org/html/rfc7517. + + + + + Magic numbers identifying ECDSA blob types + + + + + Returns a new instance of . + + A string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + A string that contains JSON Web Key parameters in JSON format. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets or sets the 'alg' (KeyType).. + + + + + Gets or sets the 'crv' (ECC - Curve).. + + + + + Gets or sets the 'd' (ECC - Private Key OR RSA - Private Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dp' (RSA - First Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dq' (RSA - Second Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'e' (RSA - Exponent).. + + + + + Gets or sets the 'k' (Symmetric - Key Value).. + + Base64urlEncoding + + + + Gets the key id of this . + + + + + Gets the 'key_ops' (Key Operations).. + + + + + Gets or sets the 'kid' (Key ID).. + + + + + Gets or sets the 'kty' (Key Type).. + + + + + Gets or sets the 'n' (RSA - Modulus).. + + Value is formated as: Base64urlEncoding + + + + Gets or sets the 'oth' (RSA - Other Primes Info).. + + + + + Gets or sets the 'p' (RSA - First Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'q' (RSA - Second Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'qi' (RSA - First CRT Coefficient).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'use' (Public Key Use).. + + + + + Gets or sets the 'x' (ECC - X Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the 'x5c' collection (X.509 Certificate Chain).. + + + + + Gets or sets the 'x5t' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5t#S256' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5u' (X.509 URL).. + + + + + Gets or sets the 'y' (ECC - Y Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the key size of . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets a bool that determines if the 'key_ops' (Key Operations) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'key_ops' (Key Operations) is not empty; otherwise, false. + + + + Gets a bool that determines if the 'x5c' collection (X.509 Certificate Chain) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'x5c' collection (X.509 Certificate Chain) is not empty; otherwise, false. + + + + Returns the size of key in bytes + + Represents ecdsa curve -P256, P384, P521 + Size of the key in bytes + + + + Returns the size of key in bits. + + Represents ecdsa curve -P256, P384, P512 + Size of the key in bits. + + + + Returns the magic value representing the curve corresponding to the curve id. + + Represents ecdsa curve -P256, P384, P512 + Whether the provider will create signatures or not + Uint representing the magic number + + + + Json web key converter + + + + + Convert security key into json web key. + + Security Key + json web key + + + + Convert RSA security key into json web key. + + RSA security key + json web key + + + + Convert X509 security key into json web key. + + X509 security key + json web key + + + + Convert Symmetric security key into json web key. + + Symmetric security key + json web key + + + + Constants for JsonWebKey Elliptical Curve Types + https://tools.ietf.org/html/rfc7518#section-6.2.1.1 + + + + + Names for Json Web Key Values + + + + + Contains a collection of that can be populated from a json string. + + provides support for http://tools.ietf.org/html/rfc7517. + + + + Returns a new instance of . + + a string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + a json string containing values. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of from a json string. + + a json string containing values. + jsonSerializerSettings + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets the . + + + + + Returns the JsonWebKeys as a . + + + + + Names for Json Web Key Set Values + + + + + Constants for JsonWebKeyUse (sec 4.2) + http://tools.ietf.org/html/rfc7517#section-4 + + + + + Log messages and codes + + + + + + + + + + + + + Detects if RSACng is available + + + + + + The purpose of this class is to ensure that we obtain an RsaCryptoServiceProvider that supports SHA-256 signatures. + If the original RsaCryptoServiceProvider doesn't support SHA-256, we create a new one using the same KeyContainer. + + + + + Initializes an new instance of . + + + + + + Destructs the instance. + + + + + Releases all resources used by the current instance of the class. + + + + + Decrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be decrypted. + true to perform direct System.Security.Cryptography.RSA decryption using OAEP padding (only available on a computer running Microsoft Windows XP or later);o + therwise, false to use PKCS#1 v1.5 padding. + + + + + Encrypts data with the System.Security.Cryptography.RSA algorithm. + + The data to be encrypted. + true to perform direct System.Security.Cryptography.RSA encryption using OAEP padding (only available on a computer running Microsoft Windows XP or later); + otherwise, false to use PKCS#1 v1.5 padding. + + + + + Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. + + The input byte array for which to compute the hash. + The hash algorithm to use to create the hash value. + The Signature for the specified data. + + + + Verifies that a digital signature is valid by determining the hash value in the signature using the provided public key and comparing it to the hash value of the provided data. + + The input byte array. + The hash algorithm to use to create the hash value. + The signature byte array to be verified. + true if the signature is valid; otherwise, false. + + + + Represents a Rsa security key. + + + + + Initializes a new instance of the class. + + + + + + Initializes a new instance of the class. + + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets RSA key size. + + + + + used to initialize the key. + + + + + instance used to initialize the key. + + + + + Constants for Security Algorithm. + + + + + Base class for Security Key. + + + + + This must be overridden to get the size of this . + + + + + Gets the key id of this . + + + + + Gets or sets . + + + + + Contains information about the keys inside the tokens. + + + + + Base class for security token. + + + + + This must be overridden to get the Id of this . + + + + + This must be overridden to get the issuer of this . + + + + + This must be overridden to get the . + + + + + This must be overridden to get or set the that signed this instance. + + .ValidateToken(...) can this value when a is used to successfully validate a signature. + + + + This must be overridden to get the time when this was Valid. + + + + + This must be overridden to get the time when this is no longer Valid. + + + + + Contains some information which used to create a security token. + + + + + Gets or sets the value of the 'audience' claim. + + + + + Gets or sets the used to create a encrypted security token. + + + + + Gets or sets the value of the 'expiration' claim. + + + + + Gets or sets the issuer of this . + + + + + Gets or sets the time the security token was issued. + + + + + Gets or sets the notbefore time for the security token. + + + + + Gets or sets the used to create a security token. + + + + + Gets or sets the . + + + + + Defines the interface for a Security Token Handler. + + + + + Creates an instance of + + + + + Returns . + + + true if attached; otherwise, false. + + + + Returns . + + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'True' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize token handled + by this instance. + + true if the WriteToken method can serialize this token. + + + + This must be overridden to get the System.Type of the SecurityToken this instance handles. + + + + + Indicates whether the current token string can be read as a token + of the type handled by this instance. + + The token string thats needs to be read. + 'True' if the ReadToken method can parse the token string. + + + + Gets and sets the maximum token size in bytes that will be processed. + + 'value' less than 1. + + + + Deserializes from string a token of the type handled by this instance. + + The string to be deserialized. + SecurityToken instance which represents the serialized token. + + + + Gets security token. + + . + SecurityToken instance which represents the serialized token. + + + + Serializes to string a token of the type handled by this instance. + + A token of type TokenType. + The serialized token. + + + + This must be overridden to serialize to XML a token of the type handled by this instance. + + The XML writer. + A token of type . + + + + This must be overridden to deserialize token with the provided . + + . + the current . + SecurityToken instance which represents the serialized token. + + + + This must be overridden to validate a token passed as a string using + + A token of type . + the current . + The token of type that was validated. + + + + Provides signature services, signing and verifying. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + 'key' is null. + 'algorithm' is null or empty. + + + + Gets the signature algorithm. + + + + + Gets or sets a user context for a . + + + + + Gets or sets the that is associated with this + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Gets the . + + + + + This must be overridden to produce a signature over the 'input'. + + bytes to sign. + signed bytes + + + + This must be overridden to verify a signature created over the 'input'. + + bytes to verify. + signature to compare against. + true if the computed signature matches the signature parameter, false otherwise. + + + + Gets or sets a bool indicating if this is expected to create signatures. + + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + The digest algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + if 'digest' is null or empty. + + + + Gets the signature algorithm. + + if 'value' is null or empty. + + + + Gets the digest algorithm. + + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + This will have precedence over + + + + Gets the used for signature creation or validation. + + + + + Gets the key id associated with . + + + + + Represents a symmetric security key. + + + + + Returns a new instance of instance. + + The byte array of the key. + + + + Gets the key size. + + + + + Gets the byte array of the key. + + + + + Provides signing and verifying operations using a and specifying an algorithm. + + + + + This is the minimum .KeySize when creating and verifying signatures. + + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + indicates if this will be used to create signatures. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Gets or sets the minimum .KeySize"/>. + + 'value' is smaller than . + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Returns the . + + The hash algorithm to use to create the hash value. + The byte array of the key. + + + + + Gets the for this . + + + + + Produces a signature over the 'input' using the and 'algorithm' passed to . + + The bytes to sign. + Signed bytes + 'input' is null. + 'input.Length' == 0. + has been called. + is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + number of bytes of signature to use. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + 'length < 1' + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Definition for AudienceValidator. + + The audiences found in the . + The being validated. + required for validation. + true if the audience is considered valid. + + + + Definition for IssuerSigningKeyResolver. + + The representation of the token that is being validated. + The that is being validated. It may be null. + A key identifier. It may be null. + required for validation. + A to use when validating a signature. + + + + Definition for IssuerSigningKeyValidator. + + The that signed the . + The being validated. + required for validation. + + + + Definition for IssuerValidator. + + The issuer to validate. + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + The delegate should return a non null string that represents the 'issuer'. If null a default value will be used. + + + + Definition for LifetimeValidator. + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + + + + Definition for TokenReplayValidator. + + The 'expiration' time found in the . + The being validated. + required for validation. + + + + + Definition for SignatureValidator. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenReader. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenDecryptionKeyResolver. + + The representation of the token to be decrypted. + The to be decrypted. The runtime by default passes null. + A key identifier. It may be null. + required for validation. + A to use when decrypting the token. + + + + Contains a set of parameters that are used by a when validating a . + + + + + This is the fallback authenticationtype that a will use if nothing is set. + + + + + Default for the clock skew. + + 300 seconds (5 minutes). + + + + Default for the maximm token size. + + 2 MB (mega bytes). + + + + Copy constructor for . + + + + + Initializes a new instance of the class. + + + + + Gets or sets . + + + + + Gets or sets a delegate that will be used to validate the audience. + + + If set, this delegate will be called to validate the 'audience' instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to read the token. + + + If set, this delegate will be called to read the token instead of normal processing. + + + + + Gets or sets the AuthenticationType when creating a . + + If 'value' is null or whitespace. + + + + Gets or sets the clock skew to apply when validating a time. + + If 'value' is less than 0. + + + + Returns a new instance of with values copied from this object. + + A new object copied from this object + This is a shallow Clone. + + + + Creates a using: + + 'NameClaimType': If NameClaimTypeRetriever is set, call delegate, else call NameClaimType. If the result is a null or empty string, use . + 'RoleClaimType': If RoleClaimTypeRetriever is set, call delegate, else call RoleClaimType. If the result is a null or empty string, use . + + A with Authentication, NameClaimType and RoleClaimType set. + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + + + + Gets or sets the that is to be used for decryption. + + + + + Gets or sets a delegate that will be called to retreive a used for decryption. + + + This will be used to decrypt the token. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets a delegate for validating the that signed the token. + + + If set, this delegate will be called to validate the that signed the token, instead of normal processing. + + + + + Gets or sets the that is to be used for signature validation. + + + + + Gets or sets a delegate that will be called to retrieve a used for signature validation. + + + This will be used to check the signature. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets an used for signature validation. + + + + + Gets or sets a delegate that will be used to validate the issuer of the token. + + + If set, this delegate will be called to validate the 'issuer' of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the lifetime of the token + + + If set, this delegate will be called to validate the lifetime of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the token replay of the token + + + If set, this delegate will be called to validate the token replay of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a that defines the . + + + Controls the value returns. It will return the first where the equals . + + + + + Gets or sets the that defines the . + + + Controls the results of . + Each where == will be checked for a match against the 'string' passed to . + + + + + Gets or sets a delegate that will be called to obtain the NameClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a value indicating whether tokens must have an 'expiration' value. + + + + + Gets or sets a value indicating whether a can be considered valid if not signed. + + + + + Gets or sets a delegate that will be called to obtain the RoleClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a boolean to control if the original token should be saved after the security token is validated. + + The runtime will consult this value and save the original token that was validated. + + + + Gets or sets a delegate that will be used to validate the signature of the token. + + + If set, this delegate will be called to signature of the token, instead of normal processing. + + + + + Gets or sets the that is to be used for decrypting inbound tokens. + + + + + Gets or set the that store tokens that can be checked to help detect token replay. + + If set, then tokens must have an expiration time or the runtime will fault. + + + + Gets or sets a value indicating if an actor token is detected, whether it should be validated. + + + + + Gets or sets a boolean to control if the audience will be validated during token validation. + + Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. + A forwarded token would contain the audience of the original site. + + + + Gets or sets a boolean to control if the issuer will be validated during token validation. + + + Validation of the issuer mitigates forwarding attacks that can occur when an + IdentityProvider represents multiple tenants and signs tokens with the same keys. + It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from + contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. A application that accepts tokens from fabrikam could forward them + to the application that accepts tokens for contoso. + + + + + Gets or sets a boolean to control if the lifetime will be validated during token validation. + + + + + Gets or sets a boolean that controls if validation of the that signed the securityToken is called. + + It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, + which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. + + + + Gets or sets a boolean to control if the token replay will be validated during token validation. + + + + + Gets or sets a string that represents a valid audience that will be used to check against the token's audience. + + + + + Gets or sets the that contains valid audiences that will be used to check against the token's audience. + + + + + Gets or sets a that represents a valid issuer that will be used to check against the token's issuer. + + + + + Gets or sets the that contains valid issuers that will be used to check against the token's issuer. + + + + + Generates unique IDs. + + + + + Creates a unique ID suitable for use in an xml:id field. The value is + not hard to guess but is unique. + + The unique ID. + + + + Creates a unique ID similar to that created by CreateNonRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The unique ID, with the given prefix. + + + + Creates a unique, random ID suitable for use in an xml:id field. The + value is hard to guess and unique. + + The unique ID. + + + + Creates a unique, random ID similar to that created by CreateRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The random URI. + + + + Creates a unique, random ID suitable for use as a URI. The value is + hard to guess and unique. The URI is in the urn:uuid: namespace. + + The random URI. + + + + Contains some utility methods. + + + + + A string with "empty" value. + + + + + A string with "null" value. + + + + + Creates a copy of the byte array. + + The resource array. + A copy of the byte array. + + + + Serializes the list of strings into string as follows: + 'str1','str2','str3' ... + + + The strings used to build a comma delimited string. + + + The single . + + + + + Returns whether the input string is https. + + The input string. + true if the input string is https; otherwise, false. + + + + Returns whether the input uri is https. + + . + true if the input uri is https; otherwise, false. + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + + true if the bytes are equal, false otherwise. + + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + length of array to check + + true if the bytes are equal, false otherwise. + + + + + AudienceValidator + + + + + Determines if the audiences found in a are valid. + + The audiences found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'audiences' is null and is true. + If is null or whitespace and is null. + If none of the 'audiences' matched either or one of . + An EXACT match is required. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + If 'vaidationParameters' is null. + If 'issuer' is null or whitespace and is true. + If is null or whitespace and is null. + If 'issuer' failed to matched either or one of . + An EXACT match is required. + + + + Validates the that signed a . + + The that signed the . + The being validated. + required for validation. + if 'securityKey' is null and ValidateIssuerSigningKey is true. + if 'securityToken' is null and ValidateIssuerSigningKey is true. + if 'vaidationParameters' is null. + + + + Validates the lifetime of a . + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'expires.HasValue' is false and is true. + If 'notBefore' is > 'expires'. + If 'notBefore' is > DateTime.UtcNow. + If 'expires' is < DateTime.UtcNow. + All time comparisons apply . + + + + Validates if a token has been replayed. + + When does the security token expire. + The being validated. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Validates if a token has been replayed. + + The being validated. + When does the security token expire. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Security key that allows access to cert + + + + + Instantiates a using a + + The cert to use. + + + + Gets the key size. + + + + + Gets the X5t of this . + + + + + Returns the private key from the . + + + + + Gets the public key from the . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets the . + + + + + Returns a bool indicating if this key is equivalent to another key. + + true if the keys are equal; otherwise, false. + + + + Returns an int hash code. + + An int hash code + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + + + + Initializes a new instance of the class. + + A that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Gets the used by this instance. + + + + diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.dll b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.dll new file mode 100644 index 0000000..950016f Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.pdb b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.pdb new file mode 100644 index 0000000..7960a7d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.xml b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.xml new file mode 100644 index 0000000..c628a04 --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.xml @@ -0,0 +1,2947 @@ + + + + Microsoft.IdentityModel.Tokens + + + + + Base class for a Security Key that contains Asymmetric key material. + + + + + This must be overridden to get a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets the status of the private key. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Enum for the existence of private key + + + + + private key exists for sure + + + + + private key doesn't exist for sure + + + + + unable to determine the existence of private key + + + + + Provides signing and verifying operations when working with an + + + + + Mapping from algorithm to minimum .KeySize when creating signatures. + + + + + Mapping from algorithm to minimum .KeySize when verifying signatures. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + Whether this is required to create signatures then set this to true. + + Creating signatures requires that the has access to a private key. + Verifying signatures (the default), does not require access to the private key. + + 'key' is null. + + willCreateSignatures is true and .KeySize is less than the size corresponding to the given algorithm in . + + + .KeySize is less than the size corresponding to the algorithm in . Note: this is always checked. + + If and algorithm pair are not supported. + If the runtime is unable to create a suitable cryptographic provider. + + + + Gets the mapping from algorithm to the minimum .KeySize for creating signatures. + + + + + Gets the mapping from algorithm to the minimum .KeySize for verifying signatures. + + + + + Returns the instance. + + The hash algorithm to use to create the hash value. + + + + Produces a signature over the 'input' using the and algorithm passed to . + + The bytes to be signed. + A signature over the input. + 'input' is null. + 'input.Length' == 0. + If has been called. + If the internal is null. This can occur if the constructor parameter 'willBeUsedforSigning' was not 'true'. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Validates that the asymmetric key size is more than the allowed minimum + + The asymmetric key to validate + Algorithm for which this key will be used + Whether they key will be used for creating signatures + + + + Verifies that a signature over the' input' matches the signature. + + The bytes to generate the signature over. + The value to verify against. + true if signature matches, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + If has been called. + If the internal is null. This can occur if a derived type does not call the base constructor. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Calls to release this managed resources. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Encodes and Decodes strings as Base64Url encoding. + + + + + The following functions perform base64url encoding which differs from regular base64 encoding as follows + * padding is skipped so the pad character '=' doesn't have to be percent encoded + * the 62nd and 63rd regular base64 encoding characters ('+' and '/') are replace with ('-' and '_') + The changes make the encoding alphabet file and URL safe. + + string to encode. + Base64Url encoding of the UTF8 bytes. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + An offset in inArray. + The number of elements of inArray to convert. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts a subset of an array of 8-bit unsigned integers to its equivalent string representation that is encoded with base-64-url digits. Parameters specify + the subset as an offset in the input array, and the number of elements in the array to convert. + + An array of 8-bit unsigned integers. + The string representation in base 64 url encodingof length elements of inArray, starting at position offset. + 'inArray' is null. + offset or length is negative OR offset plus length is greater than the length of inArray. + + + + Converts the specified string, which encodes binary data as base-64-url digits, to an equivalent 8-bit unsigned integer array. + base64Url encoded string. + UTF8 bytes. + + + + Decodes the string from Base64UrlEncoded to UTF8. + + string to decode. + UTF8 string. + + + + Definition of cache for crypto providers + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + true if the was added, false if the cache already contained the + + + + Trys to find a in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + true if the was removed, false if the was not found. + + + + Creates cryptographic operators by specifying a 's and algorithms. + + + + + Returns the default instance. + + + + + Gets or sets the default value for caching + + + + + Static constructor that initializes the default . + + + + + Default constructor for . + + + + + Constructor that creates a deep copy of given object. + + to copy from. + + + + Gets the + + + + + Extensibility point for creating custom cryptographic operators. + + By default, if set, will be called before creating cryptographic operators. + If true is returned, then will be called. The will throw if the + Cryptographic operator returned is not of the correct type. + + + + Gets or sets a bool controlling if should be cached. + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + 'key' is not a . + 'algorithm, key' pair is not supported. + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates an instance of for a specific <SecurityKey, Algorithm>. + + the to use. + the algorithm to use. + an instance of + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + + When finished with the call . + + + + + Creates a that supports the and algorithm. + + The to use for signing. + The algorithm to use for signing. + 'key' is null. + 'algorithm' is null or empty. + ' is too small. + is too small. + is not a or a . + + AsymmetricSignatureProviders require access to a PrivateKey for Signing. + When finished with the call . + + + + + Returns a instance supports the and algorithm. + + The to use for signing. + The algorithm to use for verifying. + 'key' is null. + 'algorithm' is null or empty. + is too small. + is too small. + ' is not a or a . + When finished with the call . + + + + Returns a for a specific algorithm. + + the name of the hash algorithm to create. + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Returns a for a specific algorithm. + + the keyed hash algorithm to create. + bytes to use to create the Keyed Hash + A + When finished with the call . + 'algorithm' is null or empty. + 'algorithm' is not supported. + + + + Answers if an algorithm is supported + + the name of the cryptographic algorithm + + + + + Checks if an 'algorithm, key' pair is supported. + + the algorithm to check. + the . + true if 'algorithm, key' pair is supported. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup."/> + + to be released. + + + + When finished with a call this method for cleanup. The default behavior is to call + + to be released. + + + + Helper class for adding DateTimes and Timespans. + + + + + Add a DateTime and a TimeSpan. + The maximum time is DateTime.MaxTime. It is not an error if time + timespan > MaxTime. + Just return MaxTime. + + Initial value. + to add. + as the sum of time and timespan. + + + + Gets the Maximum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Gets the Minimum value for a DateTime specifying kind. + + DateTimeKind to use. + DateTime of specified kind. + + + + Ensures that DataTime is UTC. + + to convert. + + + + + Ensures that DateTime is UTC. + + to convert. + + + + + Represents a ECDsa security key. + + + + + Returns a new instance of . + + + + + + instance used to initialize the key. + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets key size. + + + + + A wrapper class for properties that are used for token encryption. + + + + + Initializes a new instance of the class. + + + The key encryption algorithm to apply. + The encryption algorithm to apply. + + + + Gets the algorithm which used for token encryption. + + + + + Gets the algorithm which used for token encryption. + + + + + Users can override the default with this property. This factory will be used for creating encryition providers. + + + + + Gets the which used for signature valdiation. + + + + + Provides authenticated encryption and decryption services. + + + + + Initializes a new instance of the class used for encryption and decryption. + The that will be used for crypto operations. + The encryption algorithm to apply. + 'key' is null. + 'algorithm' is null or whitespace. + key size is not large enough. + 'algorithm' is not supported. + a symmetricSignatureProvider is not created. + + + + + Gets the encryption algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Encrypts the 'plaintext' + + the data to be encrypted. + will be combined with iv and ciphertext to create an authenticationtag. + initialization vector for encryption. + containing ciphertext, iv, authenticationtag. + plaintext is null or empty. + authenticationData is null or empty. + AES crypto operation threw. See inner exception for details. + + + + Decrypts ciphertext into plaintext + + the encrypted text to decrypt. + the authenticateData that is used in verification. + the initialization vector used when creating the ciphertext. + the authenticationTag that was created during the encyption. + decrypted ciphertext + 'ciphertext' is null or empty. + 'authenticatedData' is null or empty. + 'iv' is null or empty. + 'authenticationTag' is null or empty. + signature over authenticationTag fails to verify. + AES crypto operation threw. See inner exception. + + + + Checks if an 'key, algorithm' pair is supported + + the + the algorithm to check. + true if 'key, algorithm' pair is supported. + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Checks that the key has sufficient length + + that contains bytes. + the algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Contains the results of operation. + + + + + Initializes a new + + the used during + protected text. + the initialization vector used. + the bytes that need be passed to . + + + + Gets the . + + + + + Gets the Ciphertext. + + + + + Gets the initialization vector. + + + + + Gets the authentication tag + + + + + Provides Wrap key and Unwrap key services. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Unwrap a key. + + key to unwrap. + Unwrapped key. + + + + Wrap a key. + + the key to be wrapped + wrapped key. + + + + Provides RSA Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + Whether this is required to create decrypts then set this to true. + 'key' is null. + 'algorithm' is null. + The keysize doesn't match the algorithm. + If and algorithm pair are not supported. + Failed to create RSA algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Checks if an algorithm is supported. + + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using RSA decryption. + + the bytes to unwrap. + Unwrapped key + 'keyBytes' is null or length == 0. + If has been called. + Failed to unwrap the wrappedKey. + If the internal RSA algorithm is null. + + + + Wrap a key using RSA encryption. + + the key to be wrapped + A wrapped key + 'keyBytes' is null or has length == 0. + If has been called. + Failed to wrap the 'keyBytes'. + If the internal RSA algorithm is null. + + + + Provides Wrap key and Unwrap key services. + + + + + Initializes a new instance of the class used for wrap key and unwrap key. + The that will be used for crypto operations. + The KeyWrap algorithm to apply. + 'key' is null. + 'algorithm' is null. + If and algorithm pair are not supported. + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + + Gets the KeyWrap algorithm that is being used. + + + + + Gets or sets a user context for a . + + This is null by default. This can be used by runtimes or for extensibility scenarios. + + + + Gets the that is being used. + + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Returns the . + + + The cannot be converted to byte array + The keysize doesn't match the algorithm. + Failed to create symmetric algorithm with provided key and algorithm. + + + + Answers if an algorithm is supported + + the + the algorithm to use + true if the algorithm is supported; otherwise, false. + + + + Unwrap a key using Symmmetric decryption. + + bytes to unwrap + Unwraped key + 'keyBytes' is null or length == 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to unwrap the wrappedKey. + + + + Wrap a key using Symmetric encryption. + + the key to be wrapped + The wrapped key result + 'keyBytes' is null or has length 0. + 'keyBytes' is not a multiple of 8. + If has been called. + Failed to wrap 'keyBytes'. + + + + Returns the absolute DateTime or the Seconds since Unix Epoch, where Epoch is UTC 1970-01-01T0:0:0Z. + + + + + DateTime as UTV for UnixEpoch + + + + + Per JWT spec: + Gets the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the desired date/time. + + The DateTime to convert to seconds. + if dateTimeUtc less than UnixEpoch, return 0 + the number of seconds since Unix Epoch. + + + + Creates a DateTime from epoch time. + + Number of seconds. + The DateTime in UTC. + + + + Represents a security token exception when decryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Represents a security token exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime + when decrypting a token. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Throw this exception when a received Security Token has expiration time in the past. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when 'audience' of a token was not valid. + + + + + Gets or sets the InvalidAudience that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'issuer' of a token was not valid. + + + + + Gets or sets the InvalidIssuer that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'lifetime' of a token was not valid. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Gets or sets the Expires value that created the validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when 'signature' of a token was not valid. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has an invalid issuer signing key. + + + + + Gets or sets the SigningKey that was found invalid. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Represents a key wrap exception when encryption failed. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security token has an effective time + in the future. + + + + + Gets or sets the NotBefore value that created the validation exception. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when an add to the TokenReplayCache fails. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Throw this exception when a received Security Token has been replayed. + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + Initializes a new instance of + + + + + This exception is thrown when a security token contained a key identifier but the key was not found by the runtime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents a security token validation exception. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + Provides extensibility for cryptographic operators. + If custom operators are needed for then can be set to + return these operators. will be before each creation. + + + + + Called to determine if a cryptographic operation is supported. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + true if supported + + + + returns a cryptographic operator that supports the algorithm. + + the algorithm that defines the cryptographic operator. + the arguments required by the cryptographic operator. May be null. + call when finished with the object. + + + + called to release the object returned from + + the object returned from . + + + + Defines a cache for crypto providers. + Current support is limited to only. + + + + + Returns the cache key to use when looking up an entry into the cache for a + + the to create the key for. + if signatureProvider is null. + the cache key to use for finding a . + + + + Returns the 'key' that will be used to find a crypto provider in this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + the cache key to use for finding a crypto provider. + + + + Trys to adds a to this cache. + + to cache. + if signatureProvider is null. + true if the was added, false if the cache already contained the + if the is added will be set to 'this'. + + + + Trys to find a to this cache. + + the key that is used to by the crypto provider. + the algorithm that is used by the crypto provider. + the typeof the crypto provider obtained by calling object.GetType(). + a bool to indicate if the will be used to sign. + the if found. + if securityKey is null. + if algorithm is null or empty string. + if typeofProvider is null or empty string. + true if a was found, false otherwise. + + + + Trys to remove a from this cache. + + to remove. + if signatureProvider is null. + true if the was removed, false if the was not found. + if the is removed will be set to null. + + + + ISecurityTokenValidator + + + + + Returns true if the token can be read, false otherwise. + + + + + Returns true if a token can be validated. + + + + + Gets and sets the maximum size in bytes, that a will be processed. + + + + + Validates a token passed as a string using + + + + + Interface that defines a simple cache for tacking replaying of security tokens. + + + + + Try to add a securityToken. + + the security token to add. + the time when security token expires. + true if the security token was successfully added. + + + + Try to find securityToken + + the security token to find. + true if the security token is found. + + + + Constants for JsonWebAlgorithms "kty" Key Type (sec 6.1) + http://tools.ietf.org/html/rfc7518#section-6.1 + + + + + Represents a JSON Web Key as defined in http://tools.ietf.org/html/rfc7517. + + + + + Magic numbers identifying ECDSA blob types + + + + + Returns a new instance of . + + A string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + A string that contains JSON Web Key parameters in JSON format. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets or sets the 'alg' (KeyType).. + + + + + Gets or sets the 'crv' (ECC - Curve).. + + + + + Gets or sets the 'd' (ECC - Private Key OR RSA - Private Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dp' (RSA - First Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'dq' (RSA - Second Factor CRT Exponent).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'e' (RSA - Exponent).. + + + + + Gets or sets the 'k' (Symmetric - Key Value).. + + Base64urlEncoding + + + + Gets the key id of this . + + + + + Gets the 'key_ops' (Key Operations).. + + + + + Gets or sets the 'kid' (Key ID).. + + + + + Gets or sets the 'kty' (Key Type).. + + + + + Gets or sets the 'n' (RSA - Modulus).. + + Value is formated as: Base64urlEncoding + + + + Gets or sets the 'oth' (RSA - Other Primes Info).. + + + + + Gets or sets the 'p' (RSA - First Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'q' (RSA - Second Prime Factor).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'qi' (RSA - First CRT Coefficient).. + + Value is formated as: Base64urlUInt + + + + Gets or sets the 'use' (Public Key Use).. + + + + + Gets or sets the 'x' (ECC - X Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the 'x5c' collection (X.509 Certificate Chain).. + + + + + Gets or sets the 'x5t' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5t#S256' (X.509 Certificate SHA-1 thumbprint).. + + + + + Gets or sets the 'x5u' (X.509 URL).. + + + + + Gets or sets the 'y' (ECC - Y Coordinate).. + + Value is formated as: Base64urlEncoding + + + + Gets the key size of . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets a bool that determines if the 'key_ops' (Key Operations) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'key_ops' (Key Operations) is not empty; otherwise, false. + + + + Gets a bool that determines if the 'x5c' collection (X.509 Certificate Chain) property should be serialized. + This is used by Json.NET in order to conditionally serialize properties. + + true if 'x5c' collection (X.509 Certificate Chain) is not empty; otherwise, false. + + + + Returns the size of key in bytes + + Represents ecdsa curve -P256, P384, P521 + Size of the key in bytes + + + + Returns the size of key in bits. + + Represents ecdsa curve -P256, P384, P512 + Size of the key in bits. + + + + Returns the magic value representing the curve corresponding to the curve id. + + Represents ecdsa curve -P256, P384, P512 + Whether the provider will create signatures or not + Uint representing the magic number + + + + Json web key converter + + + + + Convert security key into json web key. + + Security Key + json web key + + + + Convert RSA security key into json web key. + + RSA security key + json web key + + + + Convert X509 security key into json web key. + + X509 security key + json web key + + + + Convert Symmetric security key into json web key. + + Symmetric security key + json web key + + + + Constants for JsonWebKey Elliptical Curve Types + https://tools.ietf.org/html/rfc7518#section-6.2.1.1 + + + + + Names for Json Web Key Values + + + + + Contains a collection of that can be populated from a json string. + + provides support for http://tools.ietf.org/html/rfc7517. + + + + Returns a new instance of . + + a string that contains JSON Web Key parameters in JSON format. + + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of . + + + + + Initializes an new instance of from a json string. + + a json string containing values. + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + Initializes an new instance of from a json string. + + a json string containing values. + jsonSerializerSettings + If 'json' is null or empty. + If 'json' fails to deserialize. + + + + When deserializing from JSON any properties that are not defined will be placed here. + + + + + Gets the . + + + + + Returns the JsonWebKeys as a . + + + + + Names for Json Web Key Set Values + + + + + Constants for JsonWebKeyUse (sec 4.2) + http://tools.ietf.org/html/rfc7517#section-4 + + + + + Log messages and codes + + + + + Represents a Rsa security key. + + + + + Initializes a new instance of the class. + + + + + + Initializes a new instance of the class. + + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets RSA key size. + + + + + used to initialize the key. + + + + + instance used to initialize the key. + + + + + Constants for Security Algorithm. + + + + + Base class for Security Key. + + + + + This must be overridden to get the size of this . + + + + + Gets the key id of this . + + + + + Gets or sets . + + + + + Contains information about the keys inside the tokens. + + + + + Base class for security token. + + + + + This must be overridden to get the Id of this . + + + + + This must be overridden to get the issuer of this . + + + + + This must be overridden to get the . + + + + + This must be overridden to get or set the that signed this instance. + + .ValidateToken(...) can this value when a is used to successfully validate a signature. + + + + This must be overridden to get the time when this was Valid. + + + + + This must be overridden to get the time when this is no longer Valid. + + + + + Contains some information which used to create a security token. + + + + + Gets or sets the value of the 'audience' claim. + + + + + Gets or sets the used to create a encrypted security token. + + + + + Gets or sets the value of the 'expiration' claim. + + + + + Gets or sets the issuer of this . + + + + + Gets or sets the time the security token was issued. + + + + + Gets or sets the notbefore time for the security token. + + + + + Gets or sets the used to create a security token. + + + + + Gets or sets the . + + + + + Defines the interface for a Security Token Handler. + + + + + Creates an instance of + + + + + Returns . + + + true if attached; otherwise, false. + + + + Returns . + + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'True' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize token handled + by this instance. + + true if the WriteToken method can serialize this token. + + + + This must be overridden to get the System.Type of the SecurityToken this instance handles. + + + + + Indicates whether the current token string can be read as a token + of the type handled by this instance. + + The token string thats needs to be read. + 'True' if the ReadToken method can parse the token string. + + + + Gets and sets the maximum token size in bytes that will be processed. + + 'value' less than 1. + + + + Deserializes from string a token of the type handled by this instance. + + The string to be deserialized. + SecurityToken instance which represents the serialized token. + + + + Gets security token. + + . + SecurityToken instance which represents the serialized token. + + + + Serializes to string a token of the type handled by this instance. + + A token of type TokenType. + The serialized token. + + + + This must be overridden to serialize to XML a token of the type handled by this instance. + + The XML writer. + A token of type . + + + + This must be overridden to deserialize token with the provided . + + . + the current . + SecurityToken instance which represents the serialized token. + + + + This must be overridden to validate a token passed as a string using + + A token of type . + the current . + The token of type that was validated. + + + + Provides signature services, signing and verifying. + + + + + Initializes a new instance of the class used to create and verify signatures. + + The that will be used for signature operations. + The signature algorithm to apply. + 'key' is null. + 'algorithm' is null or empty. + + + + Gets the signature algorithm. + + + + + Gets or sets a user context for a . + + + + + Gets or sets the that is associated with this + + + + + Calls and + + + + + Can be over written in descendants to dispose of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer + + + + Gets the . + + + + + This must be overridden to produce a signature over the 'input'. + + bytes to sign. + signed bytes + + + + This must be overridden to verify a signature created over the 'input'. + + bytes to verify. + signature to compare against. + true if the computed signature matches the signature parameter, false otherwise. + + + + Gets or sets a bool indicating if this is expected to create signatures. + + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'key' is null. + if 'algorithm' is null or empty. + + + + Initializes a new instance of the class. + + . + The signature algorithm to apply. + The digest algorithm to apply. + if 'key' is null. + if 'algorithm' is null or empty. + if 'digest' is null or empty. + + + + Gets the signature algorithm. + + if 'value' is null or empty. + + + + Gets the digest algorithm. + + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + This will have precedence over + + + + Gets the used for signature creation or validation. + + + + + Gets the key id associated with . + + + + + Represents a symmetric security key. + + + + + Returns a new instance of instance. + + The byte array of the key. + + + + Gets the key size. + + + + + Gets the byte array of the key. + + + + + Provides signing and verifying operations using a and specifying an algorithm. + + + + + This is the minimum .KeySize when creating and verifying signatures. + + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Initializes a new instance of the class that uses an to create and / or verify signatures over a array of bytes. + + The that will be used for signature operations. + The signature algorithm to use. + indicates if this will be used to create signatures. + 'key' is null. + 'algorithm' is null or empty. + If and algorithm pair are not supported. + '.KeySize' is smaller than . + + + + Gets or sets the minimum .KeySize"/>. + + 'value' is smaller than . + + + + Called to obtain the byte[] needed to create a + + that will be used to obtain the byte[]. + [] that is used to populated the KeyedHashAlgorithm. + if key is null. + if a byte[] can not be obtained from SecurityKey. + and are supported. + For a .Key is returned + For a Base64UrlEncoder.DecodeBytes is called with if == JsonWebAlgorithmsKeyTypes.Octet + + + + + Returns the . + + The hash algorithm to use to create the hash value. + The byte array of the key. + + + + + Gets the for this . + + + + + Produces a signature over the 'input' using the and 'algorithm' passed to . + + The bytes to sign. + Signed bytes + 'input' is null. + 'input.Length' == 0. + has been called. + is null. This can occur if a derived type deletes it or does not create it. + Sign is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + Verify is thread safe. + + + + Verifies that a signature created over the 'input' matches the signature. Using and 'algorithm' passed to . + + The bytes to verify. + signature to compare against. + number of bytes of signature to use. + true if computed signature matches the signature parameter, false otherwise. + 'input' is null. + 'signature' is null. + 'input.Length' == 0. + 'signature.Length' == 0. + 'length < 1' + has been called. + If the internal is null. This can occur if a derived type deletes it or does not create it. + + + + Disposes of internal components. + + true, if called from Dispose(), false, if invoked inside a finalizer. + + + + Definition for AudienceValidator. + + The audiences found in the . + The being validated. + required for validation. + true if the audience is considered valid. + + + + Definition for IssuerSigningKeyResolver. + + The representation of the token that is being validated. + The that is being validated. It may be null. + A key identifier. It may be null. + required for validation. + A to use when validating a signature. + + + + Definition for IssuerSigningKeyValidator. + + The that signed the . + The being validated. + required for validation. + + + + Definition for IssuerValidator. + + The issuer to validate. + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + The delegate should return a non null string that represents the 'issuer'. If null a default value will be used. + + + + Definition for LifetimeValidator. + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + + + + Definition for TokenReplayValidator. + + The 'expiration' time found in the . + The being validated. + required for validation. + + + + + Definition for SignatureValidator. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenReader. + + A securityToken with a signature. + required for validation. + + + + Definition for TokenDecryptionKeyResolver. + + The representation of the token to be decrypted. + The to be decrypted. The runtime by default passes null. + A key identifier. It may be null. + required for validation. + A to use when decrypting the token. + + + + Contains a set of parameters that are used by a when validating a . + + + + + This is the fallback authenticationtype that a will use if nothing is set. + + + + + Default for the clock skew. + + 300 seconds (5 minutes). + + + + Default for the maximm token size. + + 2 MB (mega bytes). + + + + Copy constructor for . + + + + + Initializes a new instance of the class. + + + + + Gets or sets . + + + + + Gets or sets a delegate that will be used to validate the audience. + + + If set, this delegate will be called to validate the 'audience' instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to read the token. + + + If set, this delegate will be called to read the token instead of normal processing. + + + + + Gets or sets the AuthenticationType when creating a . + + If 'value' is null or whitespace. + + + + Gets or sets the clock skew to apply when validating a time. + + If 'value' is less than 0. + + + + Returns a new instance of with values copied from this object. + + A new object copied from this object + This is a shallow Clone. + + + + Creates a using: + + 'NameClaimType': If NameClaimTypeRetriever is set, call delegate, else call NameClaimType. If the result is a null or empty string, use . + 'RoleClaimType': If RoleClaimTypeRetriever is set, call delegate, else call RoleClaimType. If the result is a null or empty string, use . + + A with Authentication, NameClaimType and RoleClaimType set. + + + + Users can override the default with this property. This factory will be used for creating signature providers. + + + + + Gets or sets the that is to be used for decryption. + + + + + Gets or sets a delegate that will be called to retreive a used for decryption. + + + This will be used to decrypt the token. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets a delegate for validating the that signed the token. + + + If set, this delegate will be called to validate the that signed the token, instead of normal processing. + + + + + Gets or sets the that is to be used for signature validation. + + + + + Gets or sets a delegate that will be called to retrieve a used for signature validation. + + + This will be used to check the signature. This can be helpful when the does not contain a key identifier. + + + + + Gets or sets an used for signature validation. + + + + + Gets or sets a delegate that will be used to validate the issuer of the token. + + + If set, this delegate will be called to validate the 'issuer' of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the lifetime of the token + + + If set, this delegate will be called to validate the lifetime of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a delegate that will be used to validate the token replay of the token + + + If set, this delegate will be called to validate the token replay of the token, instead of normal processing. + If is false, this delegate will not be called. + + + + + Gets or sets a that defines the . + + + Controls the value returns. It will return the first where the equals . + + + + + Gets or sets the that defines the . + + + Controls the results of . + Each where == will be checked for a match against the 'string' passed to . + + + + + Gets or sets a delegate that will be called to obtain the NameClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a value indicating whether tokens must have an 'expiration' value. + + + + + Gets or sets a value indicating whether a can be considered valid if not signed. + + + + + Gets or sets a delegate that will be called to obtain the RoleClaimType to use when creating a ClaimsIdentity + after validating a token. + + + + + Gets or sets a boolean to control if the original token should be saved after the security token is validated. + + The runtime will consult this value and save the original token that was validated. + + + + Gets or sets a delegate that will be used to validate the signature of the token. + + + If set, this delegate will be called to signature of the token, instead of normal processing. + + + + + Gets or sets the that is to be used for decrypting inbound tokens. + + + + + Gets or set the that store tokens that can be checked to help detect token replay. + + If set, then tokens must have an expiration time or the runtime will fault. + + + + Gets or sets a value indicating if an actor token is detected, whether it should be validated. + + + + + Gets or sets a boolean to control if the audience will be validated during token validation. + + Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. + A forwarded token would contain the audience of the original site. + + + + Gets or sets a boolean to control if the issuer will be validated during token validation. + + + Validation of the issuer mitigates forwarding attacks that can occur when an + IdentityProvider represents multiple tenants and signs tokens with the same keys. + It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from + contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. A application that accepts tokens from fabrikam could forward them + to the application that accepts tokens for contoso. + + + + + Gets or sets a boolean to control if the lifetime will be validated during token validation. + + + + + Gets or sets a boolean that controls if validation of the that signed the securityToken is called. + + It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, + which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. + + + + Gets or sets a boolean to control if the token replay will be validated during token validation. + + + + + Gets or sets a string that represents a valid audience that will be used to check against the token's audience. + + + + + Gets or sets the that contains valid audiences that will be used to check against the token's audience. + + + + + Gets or sets a that represents a valid issuer that will be used to check against the token's issuer. + + + + + Gets or sets the that contains valid issuers that will be used to check against the token's issuer. + + + + + Generates unique IDs. + + + + + Creates a unique ID suitable for use in an xml:id field. The value is + not hard to guess but is unique. + + The unique ID. + + + + Creates a unique ID similar to that created by CreateNonRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The unique ID, with the given prefix. + + + + Creates a unique, random ID suitable for use in an xml:id field. The + value is hard to guess and unique. + + The unique ID. + + + + Creates a unique, random ID similar to that created by CreateRandomId, + but instead of an underscore, the supplied prefix is used. + + The prefix to use. + The random URI. + + + + Creates a unique, random ID suitable for use as a URI. The value is + hard to guess and unique. The URI is in the urn:uuid: namespace. + + The random URI. + + + + Contains some utility methods. + + + + + A string with "empty" value. + + + + + A string with "null" value. + + + + + Creates a copy of the byte array. + + The resource array. + A copy of the byte array. + + + + Serializes the list of strings into string as follows: + 'str1','str2','str3' ... + + + The strings used to build a comma delimited string. + + + The single . + + + + + Returns whether the input string is https. + + The input string. + true if the input string is https; otherwise, false. + + + + Returns whether the input uri is https. + + . + true if the input uri is https; otherwise, false. + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + + true if the bytes are equal, false otherwise. + + + + + Compares two byte arrays for equality. Hash size is fixed normally it is 32 bytes. + The attempt here is to take the same time if an attacker shortens the signature OR changes some of the signed contents. + + + One set of bytes to compare. + + + The other set of bytes to compare with. + + length of array to check + + true if the bytes are equal, false otherwise. + + + + + AudienceValidator + + + + + Determines if the audiences found in a are valid. + + The audiences found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'audiences' is null and is true. + If is null or whitespace and is null. + If none of the 'audiences' matched either or one of . + An EXACT match is required. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the "Claim"(s) in a "ClaimsIdentity". + If 'vaidationParameters' is null. + If 'issuer' is null or whitespace and is true. + If is null or whitespace and is null. + If 'issuer' failed to matched either or one of . + An EXACT match is required. + + + + Validates the that signed a . + + The that signed the . + The being validated. + required for validation. + if 'securityKey' is null and ValidateIssuerSigningKey is true. + if 'securityToken' is null and ValidateIssuerSigningKey is true. + if 'vaidationParameters' is null. + + + + Validates the lifetime of a . + + The 'notBefore' time found in the . + The 'expiration' time found in the . + The being validated. + required for validation. + If 'vaidationParameters' is null. + If 'expires.HasValue' is false and is true. + If 'notBefore' is > 'expires'. + If 'notBefore' is > DateTime.UtcNow. + If 'expires' is < DateTime.UtcNow. + All time comparisons apply . + + + + Validates if a token has been replayed. + + When does the security token expire. + The being validated. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Validates if a token has been replayed. + + The being validated. + When does the security token expire. + required for validation. + If 'securityToken' is null or whitespace. + If 'validationParameters' is null or whitespace. + If is not null and expirationTime.HasValue is false. When a TokenReplayCache is set, tokens require an expiration time. + If the 'securityToken' is found in the cache. + If the 'securityToken' could not be added to the . + + + + Security key that allows access to cert + + + + + Instantiates a using a + + The cert to use. + + + + Gets the key size. + + + + + Gets the X5t of this . + + + + + Returns the private key from the . + + + + + Gets the public key from the . + + + + + Gets a bool indicating if a private key exists. + + true if it has a private key; otherwise, false. + + + + Gets an enum indicating if a private key exists. + + 'Exists' if private key exists for sure; 'DoesNotExist' if private key doesn't exist for sure; 'Unknown' if we cannot determine. + + + + Gets the . + + + + + Returns a bool indicating if this key is equivalent to another key. + + true if the keys are equal; otherwise, false. + + + + Returns an int hash code. + + An int hash code + + + + Defines the , algorithm and digest for digital signatures. + + + + + Initializes a new instance of the class. + + that will be used for signing. + Algorithm will be set to . + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + + + + Initializes a new instance of the class. + + A that will be used for signing. + The signature algorithm to apply. + the 'digest method' if needed may be implied from the algorithm. For example implies Sha256. + if 'certificate' is null. + if 'algorithm' is null or empty. + + + + Gets the used by this instance. + + + + diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/.signature.p7s b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/.signature.p7s new file mode 100644 index 0000000..740ed00 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/.signature.p7s differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/Microsoft.IdentityModel.Tokens.Saml.5.2.4.nupkg b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/Microsoft.IdentityModel.Tokens.Saml.5.2.4.nupkg new file mode 100644 index 0000000..0c19d3d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/Microsoft.IdentityModel.Tokens.Saml.5.2.4.nupkg differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.dll b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.dll new file mode 100644 index 0000000..e1d4cf9 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.pdb b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.pdb new file mode 100644 index 0000000..1dade5d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.xml b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.xml new file mode 100644 index 0000000..c36162a --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net45/Microsoft.IdentityModel.Tokens.Saml.xml @@ -0,0 +1,3539 @@ + + + + Microsoft.IdentityModel.Tokens.Saml + + + + + A collection of absolute URIs. + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when writing fails for a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes for Saml2Processing + + + + + Represents the Action element specified in [Saml2Core, 2.7.4.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Constructs an instance of Saml2Action class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is null. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml2Core, 2.7.4.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml2Core, 2.7.4.2] + + if 'value' is null or empty. + + + + Represents the Advice element specified in [Saml2Core, 2.6.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. [Saml2Core, 2.6.1] + + + + + Creates an instance of Saml2Advice. + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Represents the Assertion element specified in [Saml2Core, 2.3.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of a Saml2Assertion. + + Issuer of the assertion. + + + + Gets or sets the on the Assertion. + + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. [Saml2Core, 2.3.3] + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. [Saml2Core 2.3.3] + + + + + Gets or sets the identifier for this assertion. [Saml2Core, 2.3.3] + + if 'value' if null. + + + + Gets or sets the time instant of issue in UTC. [Saml2Core, 2.3.3] + + + + + Gets or sets the as the authority that is making the claim(s) in the assertion. [Saml2Core, 2.3.3] + + if 'value' is null. + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets or sets the of the statement(s) in the assertion. [Saml2Core, 2.3.3] + + + + + Gets the (s) regarding the subject. + + + + + Gets the version of this assertion. [Saml2Core, 2.3.3] + + + + + Represents the Attribute element specified in [Saml2Core, 2.7.3.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The value of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The collection of values that define the attribute. + if is Null or Empty. + + + + Gets or sets a string that provides a more human-readable form of the attribute's + name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the name of the attribute. [Saml2Core, 2.7.3.1] + + + + + Gets or sets a URI reference representing the classification of the attribute + name for the purposes of interpreting the name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the string that represents the OriginalIssuer of the this SAML Attribute. + + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets the values of the attribute. + + + + + Comparison class supporting multi-part keys for a dictionary + + + + + Represents the AttributeStatement element specified in [Saml2Core, 2.7.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AttributeStatement. + + + + + Creates an instance of Saml2AttributeStatement. + + The contained in this statement. + if is null. + + + + Creates an instance of Saml2AttributeStatement. + + The collection of elements contained in this statement. + if is null. + + + + Gets the collection of of this statement. [Saml2Core, 2.7.3] + + + + + Represents the AudienceRestriction element specified in [Saml2Core, 2.5.1.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AudienceRestriction. + + The audience element contained in this restriction. + if is null or empty. + + + + Creates an instance of Saml2AudienceRestriction. + + The collection of audience elements contained in this restriction. + if is null. + + + + Gets the audiences for which the assertion is addressed. + + + + + Represents the AuthnContext element specified in [Saml2Core, 2.7.2.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + This base class does not directly support any by-value authentication + context declarations (represented in XML by the AuthnContextDecl element). + To support by-value declarations, extend this class to support the data + model and extend Saml2AssertionSerializer, overriding ReadAuthnContext + and WriteAuthnContext to read and write the by-value declaration. + + + + + + Creates an instance of Saml2AuthenticationContext. + + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + The declaration reference of the authentication context. + + + + Gets Zero or more unique identifiers of authentication authorities that + were involved in the authentication of the principal (not including + the assertion issuer, who is presumed to have been involved without + being explicitly named here). [Saml2Core, 2.7.2.2] + + + + + Gets or sets a URI reference identifying an authentication context class that + describes the authentication context declaration that follows. + [Saml2Core, 2.7.2.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets a URI reference that identifies an authentication context + declaration. [Saml2Core, 2.7.2.2] + + if 'value' is not null and is not an absolute Uri. + + + + Represents the AuthnStatement element specified in [Saml2Core, 2.7.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates a Saml2AuthenticationStatement. + + The authentication context of this statement. + + + + Creates an instance of Saml2AuthenticationContext. + + The authentication context of this statement. + The time of the authentication. + if is null. + + + + Gets or sets the used by the authenticating authority up to and including + the authentication event that yielded this statement. [Saml2Core, 2.7.2] + + + + + Gets or sets the time at which the authentication took place. [Saml2Core, 2.7.2] + + if 'value' is null. + + + + Gets or sets the index of a particular session between the principal + identified by the subject and the authenticating authority. [Saml2Core, 2.7.2] + + + + + Gets or sets the time instant at which the session between the principal + identified by the subject and the SAML authority issuing this statement + must be considered ended. [Saml2Core, 2.7.2] + + + + + Gets or sets the which contains the DNS domain name and IP address for the system from which + the assertion subject was authenticated. [Saml2Core, 2.7.2] + + + + + Represents the AuthzDecisionStatement specified in [Saml2Core, 2.7.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + The empty URI reference, which may be used with the meaning + "the start of the current document" for the Resource property. + + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + if is null. + if is not an absolute Uri. + if is null or empty. + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + Collection of specifications. + + + + Gets of set the set of authorized to be performed on the specified + resource. [Saml2Core, 2.7.4] + + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. [Saml2Core, 2.7.4] + + + + + Gets or sets a set of that the SAML authority relied on in making + the decision. [Saml2Core, 2.7.4] + + + + + Gets or sets a URI reference identifying the resource to which access + authorization is sought. [Saml2Core, 2.7.4] + + + In addition to any absolute URI, the Resource may also be the + empty URI reference, and the meaning is defined to be "the start + of the current document". [Saml2Core, 2.7.4] + + + + + Represents the Conditions element specified in [Saml2Core, 2.5.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of . class. + + + + + Initializes a new instance of . class. + + if is null. + + + + Gets a collection of that the assertion is addressed to. + [Saml2Core, 2.5.1] + + + + + Gets or sets the earliest time instant at which the assertion is valid. + [Saml2Core, 2.5.1] + + if 'value' is greater or equal to . + + + + Gets or sets the time instant at which the assertion has expired. + [Saml2Core, 2.5.1] + + if 'value' is less than or equal to . + + + + Gets or sets a value indicating whether the assertion SHOULD be used immediately and MUST NOT + be retained for future use. [Saml2Core, 2.5.1] + + + + + Gets or sets the that specified limitations that the asserting party imposes on relying parties + that wish to subsequently act as asserting parties themselves and issue assertions of their own on the basis of the information contained in + the original assertion. [Saml2Core, 2.5.1] + + + + + Contains constants related to SAML2. + + + + + The subject of the assertion is the bearer of the assertion. [Saml2Prof, 3.3] + + + + + The holder of a specified key is considered to be the subject of the assertion + by the asserting party. [Saml2Prof, 3.1] + + + + + Indicates that no other information is available about the context of use of the + assertion. [Saml2Prof, 3.2] + + + + + These identifiers MAY be used in the Format attribute of the NameID, + NameIDPolicy, or Issuer elements to refer to common formats for the + content of the elements and the associated processing rules, if any. + [Saml2Core, 8.3] + + + + + The interpretation of the content of the element is left to + individual implementations. [Saml2Core, 8.3.1] + + + + + Indicates that the content of the element is in the form of an + email address, specifically "addr-spec" as defined in + [RFC 2822, 3.4.1]. [Saml2Core, 8.3.2] + + + + + Indicates that the content of the element is in the form specified + for the contents of the X509SubjectName element from [XMLSig]. + [Saml2Core, 8.3.3] + + + + + Indicates that the content of the element is a Windows domain + qualified name. [Saml2Core, 8.3.4] + + + + + Indicates that the content of the element is in the form of a + Kerberos principal name using the format name[/instance]@REALM. + [Saml2Core, 8.3.5] + + + + + Indicates that the content of the element is a URI identifying an + entity that provides SAML-based services (such as a SAML authority, + requester, or responder) or is a participant in SAML profiles (such + as a service provider supporting the browser SSO profile). + [Saml2Core, 8.3.6] + + + + + Indicates that the content of the element is a persistent opaque + identifier for a principal that is specific to an identity provider + and a service provider or affiliation of service providers. + [Saml2Core, 8.3.7] (See also for many restrictions on the data.) + + + + + Indicates that the content of the element is an identifier with + transient semantics and SHOULD be treated as an opaque and + temporary value by the relying party. [Saml2Core, 8.3.8] + + + + + When included in the Format attribute of the NameIDPolicy attribute, + requests that the resulting identifier be encrypted. [Saml2Core, 3.4.1.1] + + + + + Represents the Evidence element specified in [Saml2Core, 2.7.4.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + [Saml2Core, 2.7.4.3] + + + + + Initializes a new instance of class. + + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Represents the identifier used for SAML assertions. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + +
+ This identifier should be unique per [Saml2Core, 1.3.4] + and must fit the NCName xml schema definition, which is to say that + it must begin with a letter or underscore. +
+
+ + + Creates a new ID value based on a GUID. + + + + + Creates a new ID whose value is the given string. + + The Saml2 Id. + if is null or empty. + if is not a valid NCName. + + + + Gets the identifier string. + + + + + Represents the NameID element as specified in [Saml2Core, 2.2.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of from a name. + + Name string to initialize with. + + + + Initializes an instance of from a name and format. + + Name string to initialize with. + specifying the identifier format. + if is null of empty. + if is not an absolute Uri. + + + + Gets or sets the used for encrypting. + + + + + Gets or sets a URI reference representing the classification of string-based identifier + information. [Saml2Core, 2.2.2] + + if 'value' is not an absolute Uri. + + + + Gets or sets the security or administrative domain that qualifies the name. [Saml2Core, 2.2.2] + + + + + Gets or sets a name that further qualifies the name of a service provider or affiliation + of providers. [Saml2Core, 2.2.2] + + + + + Gets or sets a name identifier established by a service provider or affiliation of providers + for the entity, if different from the primary name identifier. [Saml2Core, 2.2.2] + + + + + Gets or sets the value of the name identifier. + + if 'value' is null or empty. + + + + Represents the ProxyRestriction element specified in [Saml2Core, 2.5.1.6]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of . + + + + + Gets the set of audiences to whom the asserting party permits + new assertions to be issued on the basis of this assertion. + + + + + Gets or sets the maximum number of indirections that the asserting party + permits to exist between this assertion and an assertion which has + ultimately been issued on the basis of it. + + if 'value' is less than 0. + + + + A security token backed by a SAML2 assertion. + + + + + Initializes an instance of from a . + + A to initialize from. + if is null. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml2 Tokens. See: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes a new instance of . + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Returns a value that indicates if this handler can validate a . + + 'true', indicating this instance can validate a . + + + + Gets the token type supported by this handler. + + + + + Gets the value that indicates if this instance can write a . + + 'true', indicating this instance can write a . + + + + Determines if the string is a valid Saml2 token by examining the xml for the correct start element. + + A Saml2 token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Creates a . + + The that has creation information. + A instance. + If is null. + + + + Creates a . + + The that has creation information. + additional information for creating a . + A instance. + If is null. + + + + Reads and validates a . + + The Saml2 token. + Contains validation parameters for the . + The that was validated. + is null or empty. + is null. + .Length is greater than . + if the is not well-formed. + A representing the identity contained in the token. + + + + Validates the first SubjectConfirmationData + + the Saml2 token that is being validated. + validation parameters. + If is null. + If .Assertion is null. + If is null. + If .Subject is null. + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates token for replay. + + expiration time. + the Saml2 token that is being validated. + validation parameters. + By default no action is takes, this requires users to set TokenCache or a Delegate. + + + + Validates object for lifetime. + + the being validated. + the that will be used during validation. + The to validate. + If is null. + If is null. + calls + + + + Validates that the signature. + + A Saml2 token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signature AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If .Assertion' is null. + If key fails to resolve, then null is returned. + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Reads and validates a SAML 2.0 token using the XmlReader. + + A reader positioned at a element. + validation parameters for the . + An instance of . + Currently not supported. + + + + Indicates if the current XML element is pointing to a Saml2Assertion. + + A reader that may contain a . + 'true' if reader contains a . 'false' otherwise. + + + + Creates the conditions for the assertion. + + + + Generally, conditions should be included in assertions to limit the + impact of misuse of the assertion. Specifying the NotBefore and + NotOnOrAfter conditions can limit the period of vulnerability in + the case of a compromised assertion. The AudienceRestrictionCondition + can be used to explicitly state the intended relying party or parties + of the assertion, which coupled with appropriate audience restriction + enforcement at relying parties can help to mitigate spoofing attacks + between relying parties. + + + The default implementation creates NotBefore and NotOnOrAfter conditions + based on the tokenDescriptor.Lifetime. It will also generate an + AudienceRestrictionCondition limiting consumption of the assertion to + tokenDescriptor.Scope.Address. + + + contains the details of the conditions. + A Saml2Conditions object. + If is null. + + + + Creates the advice for the assertion. + + + By default, this method returns null. + + The token descriptor. + A object, default is null. + + + + Creates a name identifier that identifies the assertion issuer. + + The token descriptor. + A using .Issuer. + If is null. + If .Issuer is null or empty. + Uses tokenDescriptor.Issuer. + + + + Creates a Saml2Attribute from a claim. + + The from which to generate a . + A created from the . + if is null. + if the has a property "ClaimsProperties.SamlAttributeNameFormat" and the value is not a valid absolute URI. + + + + Creates from a and a + + This method may return null if the token descriptor does not contain any subject or the subject does not have any claims. + + The that contains information on building the . + A Saml2AttributeStatement. + if is null. + + + + Consolidates attributes into a single attribute with multiple values. + + A of . + A of with common attributes consolidated into unique attributes with multiple values. + If is null. + + + + Transforms a ClaimsIdentity into a string. + + A to be transformed. + if is null. + A well-formed XML string. + Normally this is called when creating a from a . When is not null, + this method is called to create an string representation to add as an attribute. + The string is formed: "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor> + + + + Builds an XML formatted string from a collection of SAML attributes that represent the Actor. + + An enumeration of Saml2Attributes. + A well-formed XML string. + The string is of the form "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor>" + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + An enumeration of Saml2Statements. + if is null. + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + additional information used when creating a . + An enumeration of Saml2Statements. + if is null. + + + + Creates a Saml2AuthenticationStatement + + authenticationInformation object containing the state to be wrapped as a Saml2AuthenticationStatement object. + A + if is null, then null is returned. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates a SAML2 subject of the assertion. + + The security token descriptor to create the subject. + Thrown when 'tokenDescriptor' is null. + A . + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null. + If is null. + If .Assertion' is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + This method gets called when a special type of Saml2Attribute is detected. The Saml2Attribute passed in + wraps a Saml2Attribute that contains a collection of AttributeValues, each of which will get mapped to a + claim. All of the claims will be returned in an ClaimsIdentity with the specified issuer. + + The to use. + The that is the subject of this token. + The issuer of the claim. + Will be thrown if the Saml2Attribute does not contain any + valid Saml2AttributeValues. + + + + + Processes all statements and adds claims to the identity. + + A collection of Saml2Statement. + The . + The issuer. + + + + Adds claims from the into the . + + The . + The . + The issuer. + If is null. + If is null. + + + + Creates claims from a . + + The . + The identity that will contain a for each . + The issuer for each . + If is null. + If is null. + if multiple 'Actor' claims are found. + + + + Creates claims from a . + + The . + The identity that will contain the Authentication s. + The issuer for each . + If is null. + If is null. + If .DeclarationReference is not null. Override if this is required. + + + + Creates claims from a . + + The . + The identity that will contain the AuthorizationDecision s. + The issuer for each . + Provided for extensibility. By default no claims are added. + + + + Creates claims from a Saml2 token. + + The . + The value to set + creates the using . + A with claims from the saml statements. + If is null. + If .Assertion is null. + + + + Determines if the audience found in a is valid. + + The audiences found in the + The that is being validated. + required for validation. + for additional details. + + + + Determines if the issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Serializes a to a string. + + A . + If the is null. + If is not a . + + + + Writes a using the XmlWriter. + + A to serialize the . + The to serialize. + If is null. + If is null. + If is not a . + If is null. + + + + Reads and writes a or + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null or empty. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Reads the <saml:Action> element. + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Action. + If is positioned at an empty element. + If Saml2Action is missing @namespace. + If Saml2Action is not an Absolute Uri. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML2 namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Advice. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Reads a . + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + If is null. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads an attribute value. + + A positioned at a . + The . + The attribute value as a string. + The input parameter 'reader' is null. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnContext> element. + + + The default implementation does not handle the optional + <saml:AuthnContextDecl> element. To handle by-value + authentication context declarations, override this method. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnStatement> element or a <saml:Statement> + element that specifies an xsi:type of saml:AuthnStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Condition> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:EncryptedId> element. + + pointing at the XML EncryptedId element + An instance of representing the EncryptedId that was read + Not implemented right now. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Issuer> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:NameID> element. + + A positioned at a element. + An instance of + The input parameter 'reader' is null. + + + + Both <Issuer> and <NameID> are of NameIDType. This method reads + the content of either one of those elements. + + A positioned at a element. + An instance of + + + + Reads the <saml:ProxyRestriction> element, or a <saml:Condition> + element that specifies an xsi:type of saml:ProxyRestrictionType. + + + In the default implementation, the maximum value of the Count attribute + is limited to Int32.MaxValue. + + A positioned at a element. + An instance of + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Reads the <saml:Subject> element. + + A positioned at a element. + An instance of . + + The default implementation does not handle the optional + <EncryptedID> element. To handle encryped IDs in the Subject, + override this method. + + + + + Reads the <SubjectConfirmation> element. + + A positioned at a element. + An instance of . + + + + Reads the <saml:SubjectConfirmationData> element. + + A positioned at a element. + An instance of . + + The default implementation handles the unextended element + as well as the extended type saml:KeyInfoConfirmationDataType. + + + + + Deserializes the SAML SubjectId. + + XmlReader positioned at "NameID, EncryptedID, BaseID". + the element name of the parent element. Used in exception string. + if Element is 'BaseID' with no xsi type. + if reader is pointing at an unknown Element. + A instance. + + + + Reads the <saml:SubjectLocality> element. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .EncryptingCredentials != null. + The must have a if no are present. + The SAML2 authentication, attribute, and authorization decision require a . + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <saml:AuthnContext> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:AuthnStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null or empty. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes the <saml:Issuer> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:NameID> element. + + A to serialize the . + The to serialize. + if is null. + if null. + + + + Both <Issuer> and <NameID> are of NameIDType. Writes the content of either one of those elements. + + A to serialize the . + The to serialize. + If 'writer' is null. + If 'nameIdentifier' is null. + If 'nameIdentifier.Value' is null or empty. + + + + Writes the <saml:ProxyRestriction> element. + + A to serialize the . + The to serialize. + + + + Writes a Saml2Statement. + + + This method may write a <saml:AttributeStatement>, <saml:AuthnStatement> + or <saml:AuthzDecisionStatement> element. To handle custom Saml2Statement + classes for writing a <saml:Statement> element, override this method. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmation> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmationData> element. + + + When the data.KeyIdentifiers collection is not empty, an xsi:type + attribute will be written specifying saml:KeyInfoConfirmationDataType. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectLocality> element. + + A to serialize the . + The to serialize. + + + + Represents the StatementAbstractType specified in [Saml2Core, 2.7.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example Saml2Assertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Gets or sets the . [Saml2Core, 2.4.1] + + + + + Gets a collection of which can be used to validate and confirm the . [Saml2Core, 2.4.1] + + + If more than one subject confirmation is provied, then satisfying any one of + them is sufficient to confirm the subject for the purpose of applying the + assertion. + + + + + Represents the SubjectConfirmation element specified in [Saml2Core, 2.4.1.1]. + + + + + Initializes an instance of from a indicating the + method of confirmation. + + The to use for initialization. + + + + Initializes an instance of from a indicating the + method of confirmation and . + + The to use for initialization. + The to use for initialization. + + + + Gets or sets a URI reference that identifies a protocol or mechanism to be used to + confirm the subject. [Saml2Core, 2.4.1.1] + + + + + Gets or sets the expected to satisfy the enclosing subject + confirmation requirements. [Saml2Core, 2.4.1.1] + + + + + Gets or sets additional to be used by a specific confirmation + method. [Saml2Core, 2.4.1.1] + + + + + Represents the SubjectConfirmationData element and the associated + KeyInfoConfirmationDataType defined in [Saml2Core, 2.4.1.2-2.4.1.3]. + + + + + Initializes an instance of . + + + + + Gets or sets the network address/location from which an attesting entity can present the + assertion. [Saml2Core, 2.4.1.2] + + + + + Gets or sets the of a SAML protocol message in response to which an attesting entity can + present the assertion. [Saml2Core, 2.4.1.2] + + + + + Gets a collection of which can be used to authenticate an attesting entity. [Saml2Core, 2.4.1.3] + + + + + Gets or sets a time instant before which the subject cannot be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a time instant at which the subject can no longer be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a URI specifying the entity or location to which an attesting entity can present + the assertion. [Saml2Core, 2.4.1.2] + + + + + Represents the SubjectLocality element specified in [Saml2Core, 2.7.2.1]. + + + This element is entirely advisory, since both of these fields are quite + easily "spoofed". [Saml2Core, 2.7.2.1] + + + + + Initializes an instance of . + + + + + Initializes an instance of from an address and DNS name. + + A indicating the address. + A indicating the DNS name. + + + + Gets or sets the network address of the system from which the principal identified + by the subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + Gets or sets the DNS name of the system from which the principal identified by the + subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets the collection of authority bindings. + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes + + + + + Represents the Action element specified in [Saml, 2.4.5.1]. + see: https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf + + + + + Constructs an instance of class. + + Action value represented by this class. + if is null or empty. + + + + Constructs an instance of class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml, 2.4.5.1] + + if is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml, 2.4.5.1] + + if is null or empty. + + + + Represents the Advice element specified in [Saml, 2.3.2.2]. + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. + + + + + Creates an instance of . + + + + + Creates an instance of . + + . + + + + Creates an instance of . + + + + + + Creates an instance of . + + . + . + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representating the assertions in the . + + + + + Represents the Assertion element specified in [Saml, 2.3.2]. + + + + + Creates an instance of . + + AssertionID of the assertion. + Issuer of the assertion. + IssueInstant of the assertion. + SamlConditions of the assertion. + SamlAdvice of the assertion. + . + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. + + + + + Gets or sets the identifier for this assertion. + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the issuer in the assertion. + + + + + Gets or sets the time instant of issue in UTC. + + + + + Gets the major version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets the minor version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets or sets the on the Assertion. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets the (s) regarding the subject. + + + + + Represents the Attribute element. + + + + + Initializes a new instance of . + + + + + Initializes a new instance of s. + + The namespace of the attribute. + The name of the attribute. + The value of the attribute. + + + + Initializes a new instance of . + + The namespace of the attribute. + The name of the attribute. + . + if is null. + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets or sets the ClaimType of the attribute. + + + + + Gets or sets the name of the attribute. + + if 'value' is null or empty. + + + + Gets or sets the namespace of the attribute. + + + + + Gets or sets the string that represents the OriginalIssuer of the SAML Attribute. + + + + + Gets a collection of representing attributes. + + + + + Comparison class supporting multi-part keys for a dicitionary + + + + + A class contains Saml attribute key. + + + + + Represents the Saml Attribute Key. + + + + + + Override GetHashCode function. + + + + + + Compare AttributeKeys. + + + + + + + + Get the AttributeKey's hash code. + + + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The subject of the attribute statement. + The contained in this statement. + + + + Creates an instance of . + + The subject of the attribute statement. + . + + + + Gets a collection of . + + + + + Represents the AudienceRestrictionCondition. + + + + + Creates an instance of . + + The audience element contained in this restriction. + + + + Creates an instance of . + + An containing the audiences for a . + + + + Gets the of audiences for a . + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The Subject of the Statement. + The URI reference that specifies the type of authentication that took place. + The time at which the authentication took place. + The DNS domain name for the system entity from which the subject was apparently authenticated. + The IP address for the system entity from which the subject was apparently authenticated. + . + + + + Gets or sets the instant of authentication. + + + + + Gets or sets the method of authentication. + + if 'value' is null or empty. + + + + Gets the collection of . + + + + + Gets or sets Domain Name Service address. + + + + + Gets or sets Internet Protocol address. + + + + + Represents the SamlAuthorityBinding specified in [Saml, 2.4.3.2]. + + + + + Create an instance of . + + The type of SAML protocol queries to which the authority described by this element will respond. + The URI identifying the SAML protocol binding to use in communicating with the authority. + The URI describing how to locate and communicate with the authority. + + + + Gets or sets the AuthorityKind of the binding. + + + + + Gets or sets the binding. + + + + + Gets or sets the location of the binding. + + + + + Represents the AuthorizationDecisionStatement specified in [Saml, 2.4.5]. + + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + Collection of specifications. + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. + + + + + Gets a collection of representing the action values contained in the AuthorizationDecisionStatement. + + + + + Gets the ClaimType. + + + + + Gets or sets the evidence contained in the AuthorizationDecisionStatement. + + + + + Gets or sets the resource contained in the AuthorizationDecisionStatement. + + + + + Saml Condition element. + + + + + Represents the Conditions element specified in [Saml, 2.3.2.1]. + + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + . + + + + Gets a collection of that the assertion is addressed to. + + + + + Gets or sets the earliest time instant at which the assertion is valid. + + + + + Gets or sets the time instant at which the assertion has expired. + + + + + Contains constants related to SAML. + + + + + Known values for + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the Evidence element specified in [Saml, 2.4.5.2]. + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + . + + + + Gets a collection of . + + + + + Gets a collection of for use by the . + + + + + A security token backed by a SAML assertion. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + A to initialize from. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml Tokens, + which supports validating tokens passed as strings using . + + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes an instance of . + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'true' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize securityToken handled + by this instance. + + true if the WriteToken method can serialize this securityToken. + + + + Gets or sets the SamlSubject comparer. + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Gets the securityToken type supported by this handler. + + + + + Adds all Actors. + + . + Attribute collection to which the Actor added. + if is null. + + + + Determines if the string is a valid Saml token by examining the xml for the correct start element. + + A Saml token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Collects attributes with a common claim type, claim value type, and original issuer into a single attribute with multiple values. + + to consolidate. + common attributes collected into value lists. + + + + Override this method to provide a SamlAdvice to place in the Samltoken. + + Contains information about the token. + SamlAdvice, default is null. + + + + Generates a SamlAttribute from a claim. + + Claim from which to generate a SamlAttribute. + + if the is null. + if the type of doesn't have "/" or only has "/" at the beginning or doesn't have any character(s) after the last "/". + + + + Creates SamlAttributeStatements and adds them to a collection. + Override this method to provide a custom implementation. + + Default behavior is to create a new SamlAttributeStatement for each Subject in the tokenDescriptor.Subjects collection. + + + The SamlSubject to use in the SamlAttributeStatement that are created. + Contains all the other information that is used in token issuance. + SamlAttributeStatement + if is null. + if is null. + + + + Creates a SamlAuthenticationStatement for each AuthenticationInformation found in AuthenticationInformation. + Override this method to provide a custom implementation. + + The SamlSubject of the Statement. + Contains all the other information that is used in token issuance. + SamlAuthenticationStatement + if is null. + if Assertion has one or more AuthenticationStatement, and one of AuthenticationMethod and authenticationInstant is null. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates claims from a Saml securityToken. + + A that will be used to create the claims. + The value to set + Contains parameters for validating the securityToken. + A containing the claims from the . + if is null. + if is null. + + + + Generates all the conditions for saml + + information that is used in token issuance. + SamlConditions + if is null. + + + + Generates an enumeration of SamlStatements from a SecurityTokenDescriptor. + Only SamlAttributeStatements and SamlAuthenticationStatements are generated. + Overwrite this method to customize the creation of statements. + + Calls in order (all are virtual): + 1. CreateSamlSubject + 2. CreateAttributeStatements + 3. CreateAuthenticationStatements + 4. CreateAuthorizationDecisionStatement + + + The SecurityTokenDescriptor to use to build the statements. + additional information for creating a . + An enumeration of SamlStatement. + if is null. + + + + Returns the SamlSubject to use for all the statements that will be created. + Overwrite this method to customize the creation of the SamlSubject. + + Contains all the information that is used in token issuance. + A SamlSubject created from the first subject found in the tokenDescriptor as follows: + + 1. Claim of Type NameIdentifier is searched. If found, SamlSubject.Name is set to claim.Value. + 2. If a non-null tokenDescriptor.proof is found then SamlSubject.KeyIdentifier = tokenDescriptor.Proof.KeyIdentifier AND SamlSubject.ConfirmationMethod is set to 'HolderOfKey'. + 3. If a null tokenDescriptor.proof is found then SamlSubject.ConfirmationMethod is set to 'BearerKey'. + + + if is null. + if the tokenDescriptor has more than one name identifier claim. + + + + Creates a based on a information contained in the . + + The that has creation information. + A instance. + If is null. + + + + Creates a based on a information contained in the . + + The that has creation information. + additional information for creating the . + A instance. + If is null. + + + + Builds an XML formated string from a collection of saml attributes that represent an Actor. + + . + A well formed XML string. + The string is of the form "<Actor><SamlAttribute name, ns><SamlAttributeValue>...</SamlAttributeValue>, ...</SamlAttribute>...</Actor>" + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + if Actor existing in both identity and attributes of statement. + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + + + + Creates claims from a . + + The . + A . + The issuer. + Provided for extensibility. By default no claims are created. + + + + Creates claims from a unknow statements. + + The . + A + The issuer. + + + + Processes all statements to generate claims. + + A that will be used to create the claims. + The issuer. + Contains parameters for validating the securityToken. + A containing the claims from the . + if the statement is not a . + + + + Creates subject claims from the . + + The . + The subject. + The issuer. + if is null. + if is null. + if the doesn't have the name or confirmation methonds. + + + + Converts a string into an instance of . + + a Saml token as a string. + A + if is null or empty. + If 'token.Length' $gt; . + + + + Converts a string into an instance of . + + a Saml token as a string. + A + If is null or empty. + If 'token.Length' $gt; . + + + + Deserializes from XML a token of the type handled by this instance. + + An XML reader positioned at the token's start + element. + validation parameters for the . + An instance of . + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If is null. + If key fails to resolve, then null is returned + + + + This method gets called when a special type of SamlAttribute is detected. The SamlAttribute passed in wraps a SamlAttribute + that contains a collection of AttributeValues, each of which are mapped to a claim. All of the claims will be returned + in an ClaimsIdentity with the specified issuer. + + The SamlAttribute to be processed. + The identity that should be modified to reflect the SamlAttribute. + Issuer Identity. + if we have two delegates acting as an identity, we do not allow this. + + + + Determines if the audiences found in a are valid. + + . + The being validated. + required for validation. + see for additional details. + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null or empty. + If is null. + If is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Validates the was signed by a valid . + + The that signed the . + The being validated. + The current . + + + + Validates the lifetime of a . + + The value found in the . + The value found in the . + The being validated. + required for validation. + for additional details. + + + + Validates that the signature, if found is valid. + + A Saml token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the 'token' has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signture AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates the token replay. + + expiration time of the + to validate + that will be used during validation + + + + Reads and validates a well formed . + + A string containing a well formed securityToken. + Contains data and information needed for validation. + The that was validated. + A generated from the claims in the Saml securityToken. + if is null or whitespace. + if is null. + if 'securityToken.Length' $gt; . + + + + Serializes a to a string. + + A . + if the is null. + if the token is not a . + + + + Serializes to XML a securityToken of the type handled by this instance. + + The XML writer. + A securityToken of type . + if the is null. + if the is null. + if the token is not a . + if is null. + + + + Reads and writes SamlAssertions + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Read the <saml:Action> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Attribute> element. + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + + + + + Read the saml:AuthenticationStatement. + + XmlReader positioned at a saml:AuthenticationStatement. + SamlAuthenticationStatement + The input parameter 'reader' is null. + or the statement contains a unknown child element. + + + + Reads a <saml:Binding> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Condition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Conditions> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:DoNotCacheCondition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Read the SamlSubject from the XmlReader. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null or empty. + if is not well formed. See . + if is null or empty. + if .Count == 0. + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if any attribute values are null or empty. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <AuthenticationStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <AuthorityBinding> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null. + if is null or empty. + if is null or empty. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null. + + + + Writes the <saml:Condition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + Writes a or a all others are skipped. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:DoNotCacheCondition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes one of the suppported Statements. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Represents the StatementAbstractType specified in [Saml, 2.4]. + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example SamlAssertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.2.1]. + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + . + The confirmation data contained in the subject. + + + + Gets or sets confirmation data. + + + + + Gets confirmation methods. + + + + + Gets or sets the . + + + + + Gets or sets the. + + + + + Gets or sets the name of the Subject. + + + + + Gets the ClaimType. + + + + + Gets or sets the format of the Subject. + + + + + Gets or sets the name qualifier of the Subject. + + + + + Represents the SubjectStatement element. + + + + + Gets or sets the subject of the statement. + + +
+
diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.dll b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.dll new file mode 100644 index 0000000..97777f0 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.pdb b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.pdb new file mode 100644 index 0000000..1dade5d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.xml b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.xml new file mode 100644 index 0000000..c36162a --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/net451/Microsoft.IdentityModel.Tokens.Saml.xml @@ -0,0 +1,3539 @@ + + + + Microsoft.IdentityModel.Tokens.Saml + + + + + A collection of absolute URIs. + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when writing fails for a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes for Saml2Processing + + + + + Represents the Action element specified in [Saml2Core, 2.7.4.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Constructs an instance of Saml2Action class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is null. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml2Core, 2.7.4.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml2Core, 2.7.4.2] + + if 'value' is null or empty. + + + + Represents the Advice element specified in [Saml2Core, 2.6.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. [Saml2Core, 2.6.1] + + + + + Creates an instance of Saml2Advice. + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Represents the Assertion element specified in [Saml2Core, 2.3.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of a Saml2Assertion. + + Issuer of the assertion. + + + + Gets or sets the on the Assertion. + + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. [Saml2Core, 2.3.3] + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. [Saml2Core 2.3.3] + + + + + Gets or sets the identifier for this assertion. [Saml2Core, 2.3.3] + + if 'value' if null. + + + + Gets or sets the time instant of issue in UTC. [Saml2Core, 2.3.3] + + + + + Gets or sets the as the authority that is making the claim(s) in the assertion. [Saml2Core, 2.3.3] + + if 'value' is null. + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets or sets the of the statement(s) in the assertion. [Saml2Core, 2.3.3] + + + + + Gets the (s) regarding the subject. + + + + + Gets the version of this assertion. [Saml2Core, 2.3.3] + + + + + Represents the Attribute element specified in [Saml2Core, 2.7.3.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The value of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The collection of values that define the attribute. + if is Null or Empty. + + + + Gets or sets a string that provides a more human-readable form of the attribute's + name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the name of the attribute. [Saml2Core, 2.7.3.1] + + + + + Gets or sets a URI reference representing the classification of the attribute + name for the purposes of interpreting the name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the string that represents the OriginalIssuer of the this SAML Attribute. + + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets the values of the attribute. + + + + + Comparison class supporting multi-part keys for a dictionary + + + + + Represents the AttributeStatement element specified in [Saml2Core, 2.7.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AttributeStatement. + + + + + Creates an instance of Saml2AttributeStatement. + + The contained in this statement. + if is null. + + + + Creates an instance of Saml2AttributeStatement. + + The collection of elements contained in this statement. + if is null. + + + + Gets the collection of of this statement. [Saml2Core, 2.7.3] + + + + + Represents the AudienceRestriction element specified in [Saml2Core, 2.5.1.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AudienceRestriction. + + The audience element contained in this restriction. + if is null or empty. + + + + Creates an instance of Saml2AudienceRestriction. + + The collection of audience elements contained in this restriction. + if is null. + + + + Gets the audiences for which the assertion is addressed. + + + + + Represents the AuthnContext element specified in [Saml2Core, 2.7.2.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + This base class does not directly support any by-value authentication + context declarations (represented in XML by the AuthnContextDecl element). + To support by-value declarations, extend this class to support the data + model and extend Saml2AssertionSerializer, overriding ReadAuthnContext + and WriteAuthnContext to read and write the by-value declaration. + + + + + + Creates an instance of Saml2AuthenticationContext. + + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + The declaration reference of the authentication context. + + + + Gets Zero or more unique identifiers of authentication authorities that + were involved in the authentication of the principal (not including + the assertion issuer, who is presumed to have been involved without + being explicitly named here). [Saml2Core, 2.7.2.2] + + + + + Gets or sets a URI reference identifying an authentication context class that + describes the authentication context declaration that follows. + [Saml2Core, 2.7.2.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets a URI reference that identifies an authentication context + declaration. [Saml2Core, 2.7.2.2] + + if 'value' is not null and is not an absolute Uri. + + + + Represents the AuthnStatement element specified in [Saml2Core, 2.7.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates a Saml2AuthenticationStatement. + + The authentication context of this statement. + + + + Creates an instance of Saml2AuthenticationContext. + + The authentication context of this statement. + The time of the authentication. + if is null. + + + + Gets or sets the used by the authenticating authority up to and including + the authentication event that yielded this statement. [Saml2Core, 2.7.2] + + + + + Gets or sets the time at which the authentication took place. [Saml2Core, 2.7.2] + + if 'value' is null. + + + + Gets or sets the index of a particular session between the principal + identified by the subject and the authenticating authority. [Saml2Core, 2.7.2] + + + + + Gets or sets the time instant at which the session between the principal + identified by the subject and the SAML authority issuing this statement + must be considered ended. [Saml2Core, 2.7.2] + + + + + Gets or sets the which contains the DNS domain name and IP address for the system from which + the assertion subject was authenticated. [Saml2Core, 2.7.2] + + + + + Represents the AuthzDecisionStatement specified in [Saml2Core, 2.7.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + The empty URI reference, which may be used with the meaning + "the start of the current document" for the Resource property. + + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + if is null. + if is not an absolute Uri. + if is null or empty. + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + Collection of specifications. + + + + Gets of set the set of authorized to be performed on the specified + resource. [Saml2Core, 2.7.4] + + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. [Saml2Core, 2.7.4] + + + + + Gets or sets a set of that the SAML authority relied on in making + the decision. [Saml2Core, 2.7.4] + + + + + Gets or sets a URI reference identifying the resource to which access + authorization is sought. [Saml2Core, 2.7.4] + + + In addition to any absolute URI, the Resource may also be the + empty URI reference, and the meaning is defined to be "the start + of the current document". [Saml2Core, 2.7.4] + + + + + Represents the Conditions element specified in [Saml2Core, 2.5.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of . class. + + + + + Initializes a new instance of . class. + + if is null. + + + + Gets a collection of that the assertion is addressed to. + [Saml2Core, 2.5.1] + + + + + Gets or sets the earliest time instant at which the assertion is valid. + [Saml2Core, 2.5.1] + + if 'value' is greater or equal to . + + + + Gets or sets the time instant at which the assertion has expired. + [Saml2Core, 2.5.1] + + if 'value' is less than or equal to . + + + + Gets or sets a value indicating whether the assertion SHOULD be used immediately and MUST NOT + be retained for future use. [Saml2Core, 2.5.1] + + + + + Gets or sets the that specified limitations that the asserting party imposes on relying parties + that wish to subsequently act as asserting parties themselves and issue assertions of their own on the basis of the information contained in + the original assertion. [Saml2Core, 2.5.1] + + + + + Contains constants related to SAML2. + + + + + The subject of the assertion is the bearer of the assertion. [Saml2Prof, 3.3] + + + + + The holder of a specified key is considered to be the subject of the assertion + by the asserting party. [Saml2Prof, 3.1] + + + + + Indicates that no other information is available about the context of use of the + assertion. [Saml2Prof, 3.2] + + + + + These identifiers MAY be used in the Format attribute of the NameID, + NameIDPolicy, or Issuer elements to refer to common formats for the + content of the elements and the associated processing rules, if any. + [Saml2Core, 8.3] + + + + + The interpretation of the content of the element is left to + individual implementations. [Saml2Core, 8.3.1] + + + + + Indicates that the content of the element is in the form of an + email address, specifically "addr-spec" as defined in + [RFC 2822, 3.4.1]. [Saml2Core, 8.3.2] + + + + + Indicates that the content of the element is in the form specified + for the contents of the X509SubjectName element from [XMLSig]. + [Saml2Core, 8.3.3] + + + + + Indicates that the content of the element is a Windows domain + qualified name. [Saml2Core, 8.3.4] + + + + + Indicates that the content of the element is in the form of a + Kerberos principal name using the format name[/instance]@REALM. + [Saml2Core, 8.3.5] + + + + + Indicates that the content of the element is a URI identifying an + entity that provides SAML-based services (such as a SAML authority, + requester, or responder) or is a participant in SAML profiles (such + as a service provider supporting the browser SSO profile). + [Saml2Core, 8.3.6] + + + + + Indicates that the content of the element is a persistent opaque + identifier for a principal that is specific to an identity provider + and a service provider or affiliation of service providers. + [Saml2Core, 8.3.7] (See also for many restrictions on the data.) + + + + + Indicates that the content of the element is an identifier with + transient semantics and SHOULD be treated as an opaque and + temporary value by the relying party. [Saml2Core, 8.3.8] + + + + + When included in the Format attribute of the NameIDPolicy attribute, + requests that the resulting identifier be encrypted. [Saml2Core, 3.4.1.1] + + + + + Represents the Evidence element specified in [Saml2Core, 2.7.4.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + [Saml2Core, 2.7.4.3] + + + + + Initializes a new instance of class. + + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Represents the identifier used for SAML assertions. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + +
+ This identifier should be unique per [Saml2Core, 1.3.4] + and must fit the NCName xml schema definition, which is to say that + it must begin with a letter or underscore. +
+
+ + + Creates a new ID value based on a GUID. + + + + + Creates a new ID whose value is the given string. + + The Saml2 Id. + if is null or empty. + if is not a valid NCName. + + + + Gets the identifier string. + + + + + Represents the NameID element as specified in [Saml2Core, 2.2.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of from a name. + + Name string to initialize with. + + + + Initializes an instance of from a name and format. + + Name string to initialize with. + specifying the identifier format. + if is null of empty. + if is not an absolute Uri. + + + + Gets or sets the used for encrypting. + + + + + Gets or sets a URI reference representing the classification of string-based identifier + information. [Saml2Core, 2.2.2] + + if 'value' is not an absolute Uri. + + + + Gets or sets the security or administrative domain that qualifies the name. [Saml2Core, 2.2.2] + + + + + Gets or sets a name that further qualifies the name of a service provider or affiliation + of providers. [Saml2Core, 2.2.2] + + + + + Gets or sets a name identifier established by a service provider or affiliation of providers + for the entity, if different from the primary name identifier. [Saml2Core, 2.2.2] + + + + + Gets or sets the value of the name identifier. + + if 'value' is null or empty. + + + + Represents the ProxyRestriction element specified in [Saml2Core, 2.5.1.6]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of . + + + + + Gets the set of audiences to whom the asserting party permits + new assertions to be issued on the basis of this assertion. + + + + + Gets or sets the maximum number of indirections that the asserting party + permits to exist between this assertion and an assertion which has + ultimately been issued on the basis of it. + + if 'value' is less than 0. + + + + A security token backed by a SAML2 assertion. + + + + + Initializes an instance of from a . + + A to initialize from. + if is null. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml2 Tokens. See: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes a new instance of . + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Returns a value that indicates if this handler can validate a . + + 'true', indicating this instance can validate a . + + + + Gets the token type supported by this handler. + + + + + Gets the value that indicates if this instance can write a . + + 'true', indicating this instance can write a . + + + + Determines if the string is a valid Saml2 token by examining the xml for the correct start element. + + A Saml2 token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Creates a . + + The that has creation information. + A instance. + If is null. + + + + Creates a . + + The that has creation information. + additional information for creating a . + A instance. + If is null. + + + + Reads and validates a . + + The Saml2 token. + Contains validation parameters for the . + The that was validated. + is null or empty. + is null. + .Length is greater than . + if the is not well-formed. + A representing the identity contained in the token. + + + + Validates the first SubjectConfirmationData + + the Saml2 token that is being validated. + validation parameters. + If is null. + If .Assertion is null. + If is null. + If .Subject is null. + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates token for replay. + + expiration time. + the Saml2 token that is being validated. + validation parameters. + By default no action is takes, this requires users to set TokenCache or a Delegate. + + + + Validates object for lifetime. + + the being validated. + the that will be used during validation. + The to validate. + If is null. + If is null. + calls + + + + Validates that the signature. + + A Saml2 token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signature AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If .Assertion' is null. + If key fails to resolve, then null is returned. + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Reads and validates a SAML 2.0 token using the XmlReader. + + A reader positioned at a element. + validation parameters for the . + An instance of . + Currently not supported. + + + + Indicates if the current XML element is pointing to a Saml2Assertion. + + A reader that may contain a . + 'true' if reader contains a . 'false' otherwise. + + + + Creates the conditions for the assertion. + + + + Generally, conditions should be included in assertions to limit the + impact of misuse of the assertion. Specifying the NotBefore and + NotOnOrAfter conditions can limit the period of vulnerability in + the case of a compromised assertion. The AudienceRestrictionCondition + can be used to explicitly state the intended relying party or parties + of the assertion, which coupled with appropriate audience restriction + enforcement at relying parties can help to mitigate spoofing attacks + between relying parties. + + + The default implementation creates NotBefore and NotOnOrAfter conditions + based on the tokenDescriptor.Lifetime. It will also generate an + AudienceRestrictionCondition limiting consumption of the assertion to + tokenDescriptor.Scope.Address. + + + contains the details of the conditions. + A Saml2Conditions object. + If is null. + + + + Creates the advice for the assertion. + + + By default, this method returns null. + + The token descriptor. + A object, default is null. + + + + Creates a name identifier that identifies the assertion issuer. + + The token descriptor. + A using .Issuer. + If is null. + If .Issuer is null or empty. + Uses tokenDescriptor.Issuer. + + + + Creates a Saml2Attribute from a claim. + + The from which to generate a . + A created from the . + if is null. + if the has a property "ClaimsProperties.SamlAttributeNameFormat" and the value is not a valid absolute URI. + + + + Creates from a and a + + This method may return null if the token descriptor does not contain any subject or the subject does not have any claims. + + The that contains information on building the . + A Saml2AttributeStatement. + if is null. + + + + Consolidates attributes into a single attribute with multiple values. + + A of . + A of with common attributes consolidated into unique attributes with multiple values. + If is null. + + + + Transforms a ClaimsIdentity into a string. + + A to be transformed. + if is null. + A well-formed XML string. + Normally this is called when creating a from a . When is not null, + this method is called to create an string representation to add as an attribute. + The string is formed: "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor> + + + + Builds an XML formatted string from a collection of SAML attributes that represent the Actor. + + An enumeration of Saml2Attributes. + A well-formed XML string. + The string is of the form "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor>" + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + An enumeration of Saml2Statements. + if is null. + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + additional information used when creating a . + An enumeration of Saml2Statements. + if is null. + + + + Creates a Saml2AuthenticationStatement + + authenticationInformation object containing the state to be wrapped as a Saml2AuthenticationStatement object. + A + if is null, then null is returned. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates a SAML2 subject of the assertion. + + The security token descriptor to create the subject. + Thrown when 'tokenDescriptor' is null. + A . + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null. + If is null. + If .Assertion' is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + This method gets called when a special type of Saml2Attribute is detected. The Saml2Attribute passed in + wraps a Saml2Attribute that contains a collection of AttributeValues, each of which will get mapped to a + claim. All of the claims will be returned in an ClaimsIdentity with the specified issuer. + + The to use. + The that is the subject of this token. + The issuer of the claim. + Will be thrown if the Saml2Attribute does not contain any + valid Saml2AttributeValues. + + + + + Processes all statements and adds claims to the identity. + + A collection of Saml2Statement. + The . + The issuer. + + + + Adds claims from the into the . + + The . + The . + The issuer. + If is null. + If is null. + + + + Creates claims from a . + + The . + The identity that will contain a for each . + The issuer for each . + If is null. + If is null. + if multiple 'Actor' claims are found. + + + + Creates claims from a . + + The . + The identity that will contain the Authentication s. + The issuer for each . + If is null. + If is null. + If .DeclarationReference is not null. Override if this is required. + + + + Creates claims from a . + + The . + The identity that will contain the AuthorizationDecision s. + The issuer for each . + Provided for extensibility. By default no claims are added. + + + + Creates claims from a Saml2 token. + + The . + The value to set + creates the using . + A with claims from the saml statements. + If is null. + If .Assertion is null. + + + + Determines if the audience found in a is valid. + + The audiences found in the + The that is being validated. + required for validation. + for additional details. + + + + Determines if the issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Serializes a to a string. + + A . + If the is null. + If is not a . + + + + Writes a using the XmlWriter. + + A to serialize the . + The to serialize. + If is null. + If is null. + If is not a . + If is null. + + + + Reads and writes a or + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null or empty. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Reads the <saml:Action> element. + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Action. + If is positioned at an empty element. + If Saml2Action is missing @namespace. + If Saml2Action is not an Absolute Uri. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML2 namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Advice. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Reads a . + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + If is null. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads an attribute value. + + A positioned at a . + The . + The attribute value as a string. + The input parameter 'reader' is null. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnContext> element. + + + The default implementation does not handle the optional + <saml:AuthnContextDecl> element. To handle by-value + authentication context declarations, override this method. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnStatement> element or a <saml:Statement> + element that specifies an xsi:type of saml:AuthnStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Condition> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:EncryptedId> element. + + pointing at the XML EncryptedId element + An instance of representing the EncryptedId that was read + Not implemented right now. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Issuer> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:NameID> element. + + A positioned at a element. + An instance of + The input parameter 'reader' is null. + + + + Both <Issuer> and <NameID> are of NameIDType. This method reads + the content of either one of those elements. + + A positioned at a element. + An instance of + + + + Reads the <saml:ProxyRestriction> element, or a <saml:Condition> + element that specifies an xsi:type of saml:ProxyRestrictionType. + + + In the default implementation, the maximum value of the Count attribute + is limited to Int32.MaxValue. + + A positioned at a element. + An instance of + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Reads the <saml:Subject> element. + + A positioned at a element. + An instance of . + + The default implementation does not handle the optional + <EncryptedID> element. To handle encryped IDs in the Subject, + override this method. + + + + + Reads the <SubjectConfirmation> element. + + A positioned at a element. + An instance of . + + + + Reads the <saml:SubjectConfirmationData> element. + + A positioned at a element. + An instance of . + + The default implementation handles the unextended element + as well as the extended type saml:KeyInfoConfirmationDataType. + + + + + Deserializes the SAML SubjectId. + + XmlReader positioned at "NameID, EncryptedID, BaseID". + the element name of the parent element. Used in exception string. + if Element is 'BaseID' with no xsi type. + if reader is pointing at an unknown Element. + A instance. + + + + Reads the <saml:SubjectLocality> element. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .EncryptingCredentials != null. + The must have a if no are present. + The SAML2 authentication, attribute, and authorization decision require a . + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <saml:AuthnContext> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:AuthnStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null or empty. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes the <saml:Issuer> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:NameID> element. + + A to serialize the . + The to serialize. + if is null. + if null. + + + + Both <Issuer> and <NameID> are of NameIDType. Writes the content of either one of those elements. + + A to serialize the . + The to serialize. + If 'writer' is null. + If 'nameIdentifier' is null. + If 'nameIdentifier.Value' is null or empty. + + + + Writes the <saml:ProxyRestriction> element. + + A to serialize the . + The to serialize. + + + + Writes a Saml2Statement. + + + This method may write a <saml:AttributeStatement>, <saml:AuthnStatement> + or <saml:AuthzDecisionStatement> element. To handle custom Saml2Statement + classes for writing a <saml:Statement> element, override this method. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmation> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmationData> element. + + + When the data.KeyIdentifiers collection is not empty, an xsi:type + attribute will be written specifying saml:KeyInfoConfirmationDataType. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectLocality> element. + + A to serialize the . + The to serialize. + + + + Represents the StatementAbstractType specified in [Saml2Core, 2.7.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example Saml2Assertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Gets or sets the . [Saml2Core, 2.4.1] + + + + + Gets a collection of which can be used to validate and confirm the . [Saml2Core, 2.4.1] + + + If more than one subject confirmation is provied, then satisfying any one of + them is sufficient to confirm the subject for the purpose of applying the + assertion. + + + + + Represents the SubjectConfirmation element specified in [Saml2Core, 2.4.1.1]. + + + + + Initializes an instance of from a indicating the + method of confirmation. + + The to use for initialization. + + + + Initializes an instance of from a indicating the + method of confirmation and . + + The to use for initialization. + The to use for initialization. + + + + Gets or sets a URI reference that identifies a protocol or mechanism to be used to + confirm the subject. [Saml2Core, 2.4.1.1] + + + + + Gets or sets the expected to satisfy the enclosing subject + confirmation requirements. [Saml2Core, 2.4.1.1] + + + + + Gets or sets additional to be used by a specific confirmation + method. [Saml2Core, 2.4.1.1] + + + + + Represents the SubjectConfirmationData element and the associated + KeyInfoConfirmationDataType defined in [Saml2Core, 2.4.1.2-2.4.1.3]. + + + + + Initializes an instance of . + + + + + Gets or sets the network address/location from which an attesting entity can present the + assertion. [Saml2Core, 2.4.1.2] + + + + + Gets or sets the of a SAML protocol message in response to which an attesting entity can + present the assertion. [Saml2Core, 2.4.1.2] + + + + + Gets a collection of which can be used to authenticate an attesting entity. [Saml2Core, 2.4.1.3] + + + + + Gets or sets a time instant before which the subject cannot be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a time instant at which the subject can no longer be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a URI specifying the entity or location to which an attesting entity can present + the assertion. [Saml2Core, 2.4.1.2] + + + + + Represents the SubjectLocality element specified in [Saml2Core, 2.7.2.1]. + + + This element is entirely advisory, since both of these fields are quite + easily "spoofed". [Saml2Core, 2.7.2.1] + + + + + Initializes an instance of . + + + + + Initializes an instance of from an address and DNS name. + + A indicating the address. + A indicating the DNS name. + + + + Gets or sets the network address of the system from which the principal identified + by the subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + Gets or sets the DNS name of the system from which the principal identified by the + subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets the collection of authority bindings. + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes + + + + + Represents the Action element specified in [Saml, 2.4.5.1]. + see: https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf + + + + + Constructs an instance of class. + + Action value represented by this class. + if is null or empty. + + + + Constructs an instance of class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml, 2.4.5.1] + + if is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml, 2.4.5.1] + + if is null or empty. + + + + Represents the Advice element specified in [Saml, 2.3.2.2]. + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. + + + + + Creates an instance of . + + + + + Creates an instance of . + + . + + + + Creates an instance of . + + + + + + Creates an instance of . + + . + . + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representating the assertions in the . + + + + + Represents the Assertion element specified in [Saml, 2.3.2]. + + + + + Creates an instance of . + + AssertionID of the assertion. + Issuer of the assertion. + IssueInstant of the assertion. + SamlConditions of the assertion. + SamlAdvice of the assertion. + . + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. + + + + + Gets or sets the identifier for this assertion. + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the issuer in the assertion. + + + + + Gets or sets the time instant of issue in UTC. + + + + + Gets the major version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets the minor version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets or sets the on the Assertion. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets the (s) regarding the subject. + + + + + Represents the Attribute element. + + + + + Initializes a new instance of . + + + + + Initializes a new instance of s. + + The namespace of the attribute. + The name of the attribute. + The value of the attribute. + + + + Initializes a new instance of . + + The namespace of the attribute. + The name of the attribute. + . + if is null. + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets or sets the ClaimType of the attribute. + + + + + Gets or sets the name of the attribute. + + if 'value' is null or empty. + + + + Gets or sets the namespace of the attribute. + + + + + Gets or sets the string that represents the OriginalIssuer of the SAML Attribute. + + + + + Gets a collection of representing attributes. + + + + + Comparison class supporting multi-part keys for a dicitionary + + + + + A class contains Saml attribute key. + + + + + Represents the Saml Attribute Key. + + + + + + Override GetHashCode function. + + + + + + Compare AttributeKeys. + + + + + + + + Get the AttributeKey's hash code. + + + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The subject of the attribute statement. + The contained in this statement. + + + + Creates an instance of . + + The subject of the attribute statement. + . + + + + Gets a collection of . + + + + + Represents the AudienceRestrictionCondition. + + + + + Creates an instance of . + + The audience element contained in this restriction. + + + + Creates an instance of . + + An containing the audiences for a . + + + + Gets the of audiences for a . + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The Subject of the Statement. + The URI reference that specifies the type of authentication that took place. + The time at which the authentication took place. + The DNS domain name for the system entity from which the subject was apparently authenticated. + The IP address for the system entity from which the subject was apparently authenticated. + . + + + + Gets or sets the instant of authentication. + + + + + Gets or sets the method of authentication. + + if 'value' is null or empty. + + + + Gets the collection of . + + + + + Gets or sets Domain Name Service address. + + + + + Gets or sets Internet Protocol address. + + + + + Represents the SamlAuthorityBinding specified in [Saml, 2.4.3.2]. + + + + + Create an instance of . + + The type of SAML protocol queries to which the authority described by this element will respond. + The URI identifying the SAML protocol binding to use in communicating with the authority. + The URI describing how to locate and communicate with the authority. + + + + Gets or sets the AuthorityKind of the binding. + + + + + Gets or sets the binding. + + + + + Gets or sets the location of the binding. + + + + + Represents the AuthorizationDecisionStatement specified in [Saml, 2.4.5]. + + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + Collection of specifications. + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. + + + + + Gets a collection of representing the action values contained in the AuthorizationDecisionStatement. + + + + + Gets the ClaimType. + + + + + Gets or sets the evidence contained in the AuthorizationDecisionStatement. + + + + + Gets or sets the resource contained in the AuthorizationDecisionStatement. + + + + + Saml Condition element. + + + + + Represents the Conditions element specified in [Saml, 2.3.2.1]. + + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + . + + + + Gets a collection of that the assertion is addressed to. + + + + + Gets or sets the earliest time instant at which the assertion is valid. + + + + + Gets or sets the time instant at which the assertion has expired. + + + + + Contains constants related to SAML. + + + + + Known values for + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the Evidence element specified in [Saml, 2.4.5.2]. + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + . + + + + Gets a collection of . + + + + + Gets a collection of for use by the . + + + + + A security token backed by a SAML assertion. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + A to initialize from. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml Tokens, + which supports validating tokens passed as strings using . + + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes an instance of . + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'true' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize securityToken handled + by this instance. + + true if the WriteToken method can serialize this securityToken. + + + + Gets or sets the SamlSubject comparer. + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Gets the securityToken type supported by this handler. + + + + + Adds all Actors. + + . + Attribute collection to which the Actor added. + if is null. + + + + Determines if the string is a valid Saml token by examining the xml for the correct start element. + + A Saml token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Collects attributes with a common claim type, claim value type, and original issuer into a single attribute with multiple values. + + to consolidate. + common attributes collected into value lists. + + + + Override this method to provide a SamlAdvice to place in the Samltoken. + + Contains information about the token. + SamlAdvice, default is null. + + + + Generates a SamlAttribute from a claim. + + Claim from which to generate a SamlAttribute. + + if the is null. + if the type of doesn't have "/" or only has "/" at the beginning or doesn't have any character(s) after the last "/". + + + + Creates SamlAttributeStatements and adds them to a collection. + Override this method to provide a custom implementation. + + Default behavior is to create a new SamlAttributeStatement for each Subject in the tokenDescriptor.Subjects collection. + + + The SamlSubject to use in the SamlAttributeStatement that are created. + Contains all the other information that is used in token issuance. + SamlAttributeStatement + if is null. + if is null. + + + + Creates a SamlAuthenticationStatement for each AuthenticationInformation found in AuthenticationInformation. + Override this method to provide a custom implementation. + + The SamlSubject of the Statement. + Contains all the other information that is used in token issuance. + SamlAuthenticationStatement + if is null. + if Assertion has one or more AuthenticationStatement, and one of AuthenticationMethod and authenticationInstant is null. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates claims from a Saml securityToken. + + A that will be used to create the claims. + The value to set + Contains parameters for validating the securityToken. + A containing the claims from the . + if is null. + if is null. + + + + Generates all the conditions for saml + + information that is used in token issuance. + SamlConditions + if is null. + + + + Generates an enumeration of SamlStatements from a SecurityTokenDescriptor. + Only SamlAttributeStatements and SamlAuthenticationStatements are generated. + Overwrite this method to customize the creation of statements. + + Calls in order (all are virtual): + 1. CreateSamlSubject + 2. CreateAttributeStatements + 3. CreateAuthenticationStatements + 4. CreateAuthorizationDecisionStatement + + + The SecurityTokenDescriptor to use to build the statements. + additional information for creating a . + An enumeration of SamlStatement. + if is null. + + + + Returns the SamlSubject to use for all the statements that will be created. + Overwrite this method to customize the creation of the SamlSubject. + + Contains all the information that is used in token issuance. + A SamlSubject created from the first subject found in the tokenDescriptor as follows: + + 1. Claim of Type NameIdentifier is searched. If found, SamlSubject.Name is set to claim.Value. + 2. If a non-null tokenDescriptor.proof is found then SamlSubject.KeyIdentifier = tokenDescriptor.Proof.KeyIdentifier AND SamlSubject.ConfirmationMethod is set to 'HolderOfKey'. + 3. If a null tokenDescriptor.proof is found then SamlSubject.ConfirmationMethod is set to 'BearerKey'. + + + if is null. + if the tokenDescriptor has more than one name identifier claim. + + + + Creates a based on a information contained in the . + + The that has creation information. + A instance. + If is null. + + + + Creates a based on a information contained in the . + + The that has creation information. + additional information for creating the . + A instance. + If is null. + + + + Builds an XML formated string from a collection of saml attributes that represent an Actor. + + . + A well formed XML string. + The string is of the form "<Actor><SamlAttribute name, ns><SamlAttributeValue>...</SamlAttributeValue>, ...</SamlAttribute>...</Actor>" + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + if Actor existing in both identity and attributes of statement. + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + + + + Creates claims from a . + + The . + A . + The issuer. + Provided for extensibility. By default no claims are created. + + + + Creates claims from a unknow statements. + + The . + A + The issuer. + + + + Processes all statements to generate claims. + + A that will be used to create the claims. + The issuer. + Contains parameters for validating the securityToken. + A containing the claims from the . + if the statement is not a . + + + + Creates subject claims from the . + + The . + The subject. + The issuer. + if is null. + if is null. + if the doesn't have the name or confirmation methonds. + + + + Converts a string into an instance of . + + a Saml token as a string. + A + if is null or empty. + If 'token.Length' $gt; . + + + + Converts a string into an instance of . + + a Saml token as a string. + A + If is null or empty. + If 'token.Length' $gt; . + + + + Deserializes from XML a token of the type handled by this instance. + + An XML reader positioned at the token's start + element. + validation parameters for the . + An instance of . + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If is null. + If key fails to resolve, then null is returned + + + + This method gets called when a special type of SamlAttribute is detected. The SamlAttribute passed in wraps a SamlAttribute + that contains a collection of AttributeValues, each of which are mapped to a claim. All of the claims will be returned + in an ClaimsIdentity with the specified issuer. + + The SamlAttribute to be processed. + The identity that should be modified to reflect the SamlAttribute. + Issuer Identity. + if we have two delegates acting as an identity, we do not allow this. + + + + Determines if the audiences found in a are valid. + + . + The being validated. + required for validation. + see for additional details. + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null or empty. + If is null. + If is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Validates the was signed by a valid . + + The that signed the . + The being validated. + The current . + + + + Validates the lifetime of a . + + The value found in the . + The value found in the . + The being validated. + required for validation. + for additional details. + + + + Validates that the signature, if found is valid. + + A Saml token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the 'token' has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signture AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates the token replay. + + expiration time of the + to validate + that will be used during validation + + + + Reads and validates a well formed . + + A string containing a well formed securityToken. + Contains data and information needed for validation. + The that was validated. + A generated from the claims in the Saml securityToken. + if is null or whitespace. + if is null. + if 'securityToken.Length' $gt; . + + + + Serializes a to a string. + + A . + if the is null. + if the token is not a . + + + + Serializes to XML a securityToken of the type handled by this instance. + + The XML writer. + A securityToken of type . + if the is null. + if the is null. + if the token is not a . + if is null. + + + + Reads and writes SamlAssertions + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Read the <saml:Action> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Attribute> element. + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + + + + + Read the saml:AuthenticationStatement. + + XmlReader positioned at a saml:AuthenticationStatement. + SamlAuthenticationStatement + The input parameter 'reader' is null. + or the statement contains a unknown child element. + + + + Reads a <saml:Binding> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Condition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Conditions> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:DoNotCacheCondition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Read the SamlSubject from the XmlReader. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null or empty. + if is not well formed. See . + if is null or empty. + if .Count == 0. + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if any attribute values are null or empty. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <AuthenticationStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <AuthorityBinding> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null. + if is null or empty. + if is null or empty. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null. + + + + Writes the <saml:Condition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + Writes a or a all others are skipped. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:DoNotCacheCondition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes one of the suppported Statements. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Represents the StatementAbstractType specified in [Saml, 2.4]. + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example SamlAssertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.2.1]. + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + . + The confirmation data contained in the subject. + + + + Gets or sets confirmation data. + + + + + Gets confirmation methods. + + + + + Gets or sets the . + + + + + Gets or sets the. + + + + + Gets or sets the name of the Subject. + + + + + Gets the ClaimType. + + + + + Gets or sets the format of the Subject. + + + + + Gets or sets the name qualifier of the Subject. + + + + + Represents the SubjectStatement element. + + + + + Gets or sets the subject of the statement. + + +
+
diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.dll b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.dll new file mode 100644 index 0000000..7a42d0e Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.dll differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.pdb b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.pdb new file mode 100644 index 0000000..20cd264 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.xml b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.xml new file mode 100644 index 0000000..c36162a --- /dev/null +++ b/packages/Microsoft.IdentityModel.Tokens.Saml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Tokens.Saml.xml @@ -0,0 +1,3539 @@ + + + + Microsoft.IdentityModel.Tokens.Saml + + + + + A collection of absolute URIs. + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when writing fails for a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes for Saml2Processing + + + + + Represents the Action element specified in [Saml2Core, 2.7.4.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Constructs an instance of Saml2Action class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is null. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml2Core, 2.7.4.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml2Core, 2.7.4.2] + + if 'value' is null or empty. + + + + Represents the Advice element specified in [Saml2Core, 2.6.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. [Saml2Core, 2.6.1] + + + + + Creates an instance of Saml2Advice. + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representing the assertions in the . + + + + + Represents the Assertion element specified in [Saml2Core, 2.3.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of a Saml2Assertion. + + Issuer of the assertion. + + + + Gets or sets the on the Assertion. + + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. [Saml2Core, 2.3.3] + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. [Saml2Core 2.3.3] + + + + + Gets or sets the identifier for this assertion. [Saml2Core, 2.3.3] + + if 'value' if null. + + + + Gets or sets the time instant of issue in UTC. [Saml2Core, 2.3.3] + + + + + Gets or sets the as the authority that is making the claim(s) in the assertion. [Saml2Core, 2.3.3] + + if 'value' is null. + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets or sets the of the statement(s) in the assertion. [Saml2Core, 2.3.3] + + + + + Gets the (s) regarding the subject. + + + + + Gets the version of this assertion. [Saml2Core, 2.3.3] + + + + + Represents the Attribute element specified in [Saml2Core, 2.7.3.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The value of the attribute. + if is Null or Empty. + + + + Initializes a new instance of the Saml2Attribute class. + + The name of the attribute. + The collection of values that define the attribute. + if is Null or Empty. + + + + Gets or sets a string that provides a more human-readable form of the attribute's + name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the name of the attribute. [Saml2Core, 2.7.3.1] + + + + + Gets or sets a URI reference representing the classification of the attribute + name for the purposes of interpreting the name. [Saml2Core, 2.7.3.1] + + + + + Gets or sets the string that represents the OriginalIssuer of the this SAML Attribute. + + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets the values of the attribute. + + + + + Comparison class supporting multi-part keys for a dictionary + + + + + Represents the AttributeStatement element specified in [Saml2Core, 2.7.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AttributeStatement. + + + + + Creates an instance of Saml2AttributeStatement. + + The contained in this statement. + if is null. + + + + Creates an instance of Saml2AttributeStatement. + + The collection of elements contained in this statement. + if is null. + + + + Gets the collection of of this statement. [Saml2Core, 2.7.3] + + + + + Represents the AudienceRestriction element specified in [Saml2Core, 2.5.1.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates an instance of Saml2AudienceRestriction. + + The audience element contained in this restriction. + if is null or empty. + + + + Creates an instance of Saml2AudienceRestriction. + + The collection of audience elements contained in this restriction. + if is null. + + + + Gets the audiences for which the assertion is addressed. + + + + + Represents the AuthnContext element specified in [Saml2Core, 2.7.2.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + This base class does not directly support any by-value authentication + context declarations (represented in XML by the AuthnContextDecl element). + To support by-value declarations, extend this class to support the data + model and extend Saml2AssertionSerializer, overriding ReadAuthnContext + and WriteAuthnContext to read and write the by-value declaration. + + + + + + Creates an instance of Saml2AuthenticationContext. + + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + + + + Creates an instance of Saml2AuthenticationContext. + + The class reference of the authentication context. + The declaration reference of the authentication context. + + + + Gets Zero or more unique identifiers of authentication authorities that + were involved in the authentication of the principal (not including + the assertion issuer, who is presumed to have been involved without + being explicitly named here). [Saml2Core, 2.7.2.2] + + + + + Gets or sets a URI reference identifying an authentication context class that + describes the authentication context declaration that follows. + [Saml2Core, 2.7.2.2] + + if 'value' is null. + if 'value' is not an absolute Uri. + + + + Gets or sets a URI reference that identifies an authentication context + declaration. [Saml2Core, 2.7.2.2] + + if 'value' is not null and is not an absolute Uri. + + + + Represents the AuthnStatement element specified in [Saml2Core, 2.7.2]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Creates a Saml2AuthenticationStatement. + + The authentication context of this statement. + + + + Creates an instance of Saml2AuthenticationContext. + + The authentication context of this statement. + The time of the authentication. + if is null. + + + + Gets or sets the used by the authenticating authority up to and including + the authentication event that yielded this statement. [Saml2Core, 2.7.2] + + + + + Gets or sets the time at which the authentication took place. [Saml2Core, 2.7.2] + + if 'value' is null. + + + + Gets or sets the index of a particular session between the principal + identified by the subject and the authenticating authority. [Saml2Core, 2.7.2] + + + + + Gets or sets the time instant at which the session between the principal + identified by the subject and the SAML authority issuing this statement + must be considered ended. [Saml2Core, 2.7.2] + + + + + Gets or sets the which contains the DNS domain name and IP address for the system from which + the assertion subject was authenticated. [Saml2Core, 2.7.2] + + + + + Represents the AuthzDecisionStatement specified in [Saml2Core, 2.7.4]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + The empty URI reference, which may be used with the meaning + "the start of the current document" for the Resource property. + + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + if is null. + if is not an absolute Uri. + if is null or empty. + + + + Initializes a new instance of the class from + a resource and decision. + + The of the resource to be authorized. + The AccessDecision in use. + Collection of specifications. + + + + Gets of set the set of authorized to be performed on the specified + resource. [Saml2Core, 2.7.4] + + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. [Saml2Core, 2.7.4] + + + + + Gets or sets a set of that the SAML authority relied on in making + the decision. [Saml2Core, 2.7.4] + + + + + Gets or sets a URI reference identifying the resource to which access + authorization is sought. [Saml2Core, 2.7.4] + + + In addition to any absolute URI, the Resource may also be the + empty URI reference, and the meaning is defined to be "the start + of the current document". [Saml2Core, 2.7.4] + + + + + Represents the Conditions element specified in [Saml2Core, 2.5.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes a new instance of . class. + + + + + Initializes a new instance of . class. + + if is null. + + + + Gets a collection of that the assertion is addressed to. + [Saml2Core, 2.5.1] + + + + + Gets or sets the earliest time instant at which the assertion is valid. + [Saml2Core, 2.5.1] + + if 'value' is greater or equal to . + + + + Gets or sets the time instant at which the assertion has expired. + [Saml2Core, 2.5.1] + + if 'value' is less than or equal to . + + + + Gets or sets a value indicating whether the assertion SHOULD be used immediately and MUST NOT + be retained for future use. [Saml2Core, 2.5.1] + + + + + Gets or sets the that specified limitations that the asserting party imposes on relying parties + that wish to subsequently act as asserting parties themselves and issue assertions of their own on the basis of the information contained in + the original assertion. [Saml2Core, 2.5.1] + + + + + Contains constants related to SAML2. + + + + + The subject of the assertion is the bearer of the assertion. [Saml2Prof, 3.3] + + + + + The holder of a specified key is considered to be the subject of the assertion + by the asserting party. [Saml2Prof, 3.1] + + + + + Indicates that no other information is available about the context of use of the + assertion. [Saml2Prof, 3.2] + + + + + These identifiers MAY be used in the Format attribute of the NameID, + NameIDPolicy, or Issuer elements to refer to common formats for the + content of the elements and the associated processing rules, if any. + [Saml2Core, 8.3] + + + + + The interpretation of the content of the element is left to + individual implementations. [Saml2Core, 8.3.1] + + + + + Indicates that the content of the element is in the form of an + email address, specifically "addr-spec" as defined in + [RFC 2822, 3.4.1]. [Saml2Core, 8.3.2] + + + + + Indicates that the content of the element is in the form specified + for the contents of the X509SubjectName element from [XMLSig]. + [Saml2Core, 8.3.3] + + + + + Indicates that the content of the element is a Windows domain + qualified name. [Saml2Core, 8.3.4] + + + + + Indicates that the content of the element is in the form of a + Kerberos principal name using the format name[/instance]@REALM. + [Saml2Core, 8.3.5] + + + + + Indicates that the content of the element is a URI identifying an + entity that provides SAML-based services (such as a SAML authority, + requester, or responder) or is a participant in SAML profiles (such + as a service provider supporting the browser SSO profile). + [Saml2Core, 8.3.6] + + + + + Indicates that the content of the element is a persistent opaque + identifier for a principal that is specific to an identity provider + and a service provider or affiliation of service providers. + [Saml2Core, 8.3.7] (See also for many restrictions on the data.) + + + + + Indicates that the content of the element is an identifier with + transient semantics and SHOULD be treated as an opaque and + temporary value by the relying party. [Saml2Core, 8.3.8] + + + + + When included in the Format attribute of the NameIDPolicy attribute, + requests that the resulting identifier be encrypted. [Saml2Core, 3.4.1.1] + + + + + Represents the Evidence element specified in [Saml2Core, 2.7.4.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + [Saml2Core, 2.7.4.3] + + + + + Initializes a new instance of class. + + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Initializes a new instance of class from a . + + containing the evidence. + if is null. + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Gets a collection of for use by the . + + + + + Represents the identifier used for SAML assertions. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + +
+ This identifier should be unique per [Saml2Core, 1.3.4] + and must fit the NCName xml schema definition, which is to say that + it must begin with a letter or underscore. +
+
+ + + Creates a new ID value based on a GUID. + + + + + Creates a new ID whose value is the given string. + + The Saml2 Id. + if is null or empty. + if is not a valid NCName. + + + + Gets the identifier string. + + + + + Represents the NameID element as specified in [Saml2Core, 2.2.3]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of from a name. + + Name string to initialize with. + + + + Initializes an instance of from a name and format. + + Name string to initialize with. + specifying the identifier format. + if is null of empty. + if is not an absolute Uri. + + + + Gets or sets the used for encrypting. + + + + + Gets or sets a URI reference representing the classification of string-based identifier + information. [Saml2Core, 2.2.2] + + if 'value' is not an absolute Uri. + + + + Gets or sets the security or administrative domain that qualifies the name. [Saml2Core, 2.2.2] + + + + + Gets or sets a name that further qualifies the name of a service provider or affiliation + of providers. [Saml2Core, 2.2.2] + + + + + Gets or sets a name identifier established by a service provider or affiliation of providers + for the entity, if different from the primary name identifier. [Saml2Core, 2.2.2] + + + + + Gets or sets the value of the name identifier. + + if 'value' is null or empty. + + + + Represents the ProxyRestriction element specified in [Saml2Core, 2.5.1.6]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Initializes an instance of . + + + + + Gets the set of audiences to whom the asserting party permits + new assertions to be issued on the basis of this assertion. + + + + + Gets or sets the maximum number of indirections that the asserting party + permits to exist between this assertion and an assertion which has + ultimately been issued on the basis of it. + + if 'value' is less than 0. + + + + A security token backed by a SAML2 assertion. + + + + + Initializes an instance of from a . + + A to initialize from. + if is null. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml2 Tokens. See: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes a new instance of . + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Returns a value that indicates if this handler can validate a . + + 'true', indicating this instance can validate a . + + + + Gets the token type supported by this handler. + + + + + Gets the value that indicates if this instance can write a . + + 'true', indicating this instance can write a . + + + + Determines if the string is a valid Saml2 token by examining the xml for the correct start element. + + A Saml2 token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Creates a . + + The that has creation information. + A instance. + If is null. + + + + Creates a . + + The that has creation information. + additional information for creating a . + A instance. + If is null. + + + + Reads and validates a . + + The Saml2 token. + Contains validation parameters for the . + The that was validated. + is null or empty. + is null. + .Length is greater than . + if the is not well-formed. + A representing the identity contained in the token. + + + + Validates the first SubjectConfirmationData + + the Saml2 token that is being validated. + validation parameters. + If is null. + If .Assertion is null. + If is null. + If .Subject is null. + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates token for replay. + + expiration time. + the Saml2 token that is being validated. + validation parameters. + By default no action is takes, this requires users to set TokenCache or a Delegate. + + + + Validates object for lifetime. + + the being validated. + the that will be used during validation. + The to validate. + If is null. + If is null. + calls + + + + Validates that the signature. + + A Saml2 token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signature AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If .Assertion' is null. + If key fails to resolve, then null is returned. + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Converts a string into an instance of . + + a Saml2 token as a string. + If is null or empty. + If .Length $gt; . + A + + + + Reads and validates a SAML 2.0 token using the XmlReader. + + A reader positioned at a element. + validation parameters for the . + An instance of . + Currently not supported. + + + + Indicates if the current XML element is pointing to a Saml2Assertion. + + A reader that may contain a . + 'true' if reader contains a . 'false' otherwise. + + + + Creates the conditions for the assertion. + + + + Generally, conditions should be included in assertions to limit the + impact of misuse of the assertion. Specifying the NotBefore and + NotOnOrAfter conditions can limit the period of vulnerability in + the case of a compromised assertion. The AudienceRestrictionCondition + can be used to explicitly state the intended relying party or parties + of the assertion, which coupled with appropriate audience restriction + enforcement at relying parties can help to mitigate spoofing attacks + between relying parties. + + + The default implementation creates NotBefore and NotOnOrAfter conditions + based on the tokenDescriptor.Lifetime. It will also generate an + AudienceRestrictionCondition limiting consumption of the assertion to + tokenDescriptor.Scope.Address. + + + contains the details of the conditions. + A Saml2Conditions object. + If is null. + + + + Creates the advice for the assertion. + + + By default, this method returns null. + + The token descriptor. + A object, default is null. + + + + Creates a name identifier that identifies the assertion issuer. + + The token descriptor. + A using .Issuer. + If is null. + If .Issuer is null or empty. + Uses tokenDescriptor.Issuer. + + + + Creates a Saml2Attribute from a claim. + + The from which to generate a . + A created from the . + if is null. + if the has a property "ClaimsProperties.SamlAttributeNameFormat" and the value is not a valid absolute URI. + + + + Creates from a and a + + This method may return null if the token descriptor does not contain any subject or the subject does not have any claims. + + The that contains information on building the . + A Saml2AttributeStatement. + if is null. + + + + Consolidates attributes into a single attribute with multiple values. + + A of . + A of with common attributes consolidated into unique attributes with multiple values. + If is null. + + + + Transforms a ClaimsIdentity into a string. + + A to be transformed. + if is null. + A well-formed XML string. + Normally this is called when creating a from a . When is not null, + this method is called to create an string representation to add as an attribute. + The string is formed: "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor> + + + + Builds an XML formatted string from a collection of SAML attributes that represent the Actor. + + An enumeration of Saml2Attributes. + A well-formed XML string. + The string is of the form "<Actor><Attribute name, namespace><AttributeValue>...</AttributeValue>, ...</Attribute>...</Actor>" + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + An enumeration of Saml2Statements. + if is null. + + + + Creates an of to be included in the assertion. + + + + Statements are not required in a SAML2 assertion. This method may + return an empty collection. + + + The that contains information on creating the . + additional information used when creating a . + An enumeration of Saml2Statements. + if is null. + + + + Creates a Saml2AuthenticationStatement + + authenticationInformation object containing the state to be wrapped as a Saml2AuthenticationStatement object. + A + if is null, then null is returned. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates a SAML2 subject of the assertion. + + The security token descriptor to create the subject. + Thrown when 'tokenDescriptor' is null. + A . + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null. + If is null. + If .Assertion' is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + This method gets called when a special type of Saml2Attribute is detected. The Saml2Attribute passed in + wraps a Saml2Attribute that contains a collection of AttributeValues, each of which will get mapped to a + claim. All of the claims will be returned in an ClaimsIdentity with the specified issuer. + + The to use. + The that is the subject of this token. + The issuer of the claim. + Will be thrown if the Saml2Attribute does not contain any + valid Saml2AttributeValues. + + + + + Processes all statements and adds claims to the identity. + + A collection of Saml2Statement. + The . + The issuer. + + + + Adds claims from the into the . + + The . + The . + The issuer. + If is null. + If is null. + + + + Creates claims from a . + + The . + The identity that will contain a for each . + The issuer for each . + If is null. + If is null. + if multiple 'Actor' claims are found. + + + + Creates claims from a . + + The . + The identity that will contain the Authentication s. + The issuer for each . + If is null. + If is null. + If .DeclarationReference is not null. Override if this is required. + + + + Creates claims from a . + + The . + The identity that will contain the AuthorizationDecision s. + The issuer for each . + Provided for extensibility. By default no claims are added. + + + + Creates claims from a Saml2 token. + + The . + The value to set + creates the using . + A with claims from the saml statements. + If is null. + If .Assertion is null. + + + + Determines if the audience found in a is valid. + + The audiences found in the + The that is being validated. + required for validation. + for additional details. + + + + Determines if the issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Serializes a to a string. + + A . + If the is null. + If is not a . + + + + Writes a using the XmlWriter. + + A to serialize the . + The to serialize. + If is null. + If is null. + If is not a . + If is null. + + + + Reads and writes a or + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null or empty. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Reads the <saml:Action> element. + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Action. + If is positioned at an empty element. + If Saml2Action is missing @namespace. + If Saml2Action is not an Absolute Uri. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML2 namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + If is null. + If is not positioned at a Saml2Advice. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Reads a . + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + If is null. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads an attribute value. + + A positioned at a . + The . + The attribute value as a string. + The input parameter 'reader' is null. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnContext> element. + + + The default implementation does not handle the optional + <saml:AuthnContextDecl> element. To handle by-value + authentication context declarations, override this method. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthnStatement> element or a <saml:Statement> + element that specifies an xsi:type of saml:AuthnStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Condition> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:EncryptedId> element. + + pointing at the XML EncryptedId element + An instance of representing the EncryptedId that was read + Not implemented right now. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Issuer> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:NameID> element. + + A positioned at a element. + An instance of + The input parameter 'reader' is null. + + + + Both <Issuer> and <NameID> are of NameIDType. This method reads + the content of either one of those elements. + + A positioned at a element. + An instance of + + + + Reads the <saml:ProxyRestriction> element, or a <saml:Condition> + element that specifies an xsi:type of saml:ProxyRestrictionType. + + + In the default implementation, the maximum value of the Count attribute + is limited to Int32.MaxValue. + + A positioned at a element. + An instance of + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Reads the <saml:Subject> element. + + A positioned at a element. + An instance of . + + The default implementation does not handle the optional + <EncryptedID> element. To handle encryped IDs in the Subject, + override this method. + + + + + Reads the <SubjectConfirmation> element. + + A positioned at a element. + An instance of . + + + + Reads the <saml:SubjectConfirmationData> element. + + A positioned at a element. + An instance of . + + The default implementation handles the unextended element + as well as the extended type saml:KeyInfoConfirmationDataType. + + + + + Deserializes the SAML SubjectId. + + XmlReader positioned at "NameID, EncryptedID, BaseID". + the element name of the parent element. Used in exception string. + if Element is 'BaseID' with no xsi type. + if reader is pointing at an unknown Element. + A instance. + + + + Reads the <saml:SubjectLocality> element. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .EncryptingCredentials != null. + The must have a if no are present. + The SAML2 authentication, attribute, and authorization decision require a . + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <saml:AuthnContext> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:AuthnStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null or empty. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes the <saml:Issuer> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:NameID> element. + + A to serialize the . + The to serialize. + if is null. + if null. + + + + Both <Issuer> and <NameID> are of NameIDType. Writes the content of either one of those elements. + + A to serialize the . + The to serialize. + If 'writer' is null. + If 'nameIdentifier' is null. + If 'nameIdentifier.Value' is null or empty. + + + + Writes the <saml:ProxyRestriction> element. + + A to serialize the . + The to serialize. + + + + Writes a Saml2Statement. + + + This method may write a <saml:AttributeStatement>, <saml:AuthnStatement> + or <saml:AuthzDecisionStatement> element. To handle custom Saml2Statement + classes for writing a <saml:Statement> element, override this method. + + A to serialize the . + The to serialize. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmation> element. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectConfirmationData> element. + + + When the data.KeyIdentifiers collection is not empty, an xsi:type + attribute will be written specifying saml:KeyInfoConfirmationDataType. + + A to serialize the . + The to serialize. + + + + Writes the <saml:SubjectLocality> element. + + A to serialize the . + The to serialize. + + + + Represents the StatementAbstractType specified in [Saml2Core, 2.7.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example Saml2Assertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.1]. + see: http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Initializes an instance of from a . + + The to use for initialization. + + + + Gets or sets the . [Saml2Core, 2.4.1] + + + + + Gets a collection of which can be used to validate and confirm the . [Saml2Core, 2.4.1] + + + If more than one subject confirmation is provied, then satisfying any one of + them is sufficient to confirm the subject for the purpose of applying the + assertion. + + + + + Represents the SubjectConfirmation element specified in [Saml2Core, 2.4.1.1]. + + + + + Initializes an instance of from a indicating the + method of confirmation. + + The to use for initialization. + + + + Initializes an instance of from a indicating the + method of confirmation and . + + The to use for initialization. + The to use for initialization. + + + + Gets or sets a URI reference that identifies a protocol or mechanism to be used to + confirm the subject. [Saml2Core, 2.4.1.1] + + + + + Gets or sets the expected to satisfy the enclosing subject + confirmation requirements. [Saml2Core, 2.4.1.1] + + + + + Gets or sets additional to be used by a specific confirmation + method. [Saml2Core, 2.4.1.1] + + + + + Represents the SubjectConfirmationData element and the associated + KeyInfoConfirmationDataType defined in [Saml2Core, 2.4.1.2-2.4.1.3]. + + + + + Initializes an instance of . + + + + + Gets or sets the network address/location from which an attesting entity can present the + assertion. [Saml2Core, 2.4.1.2] + + + + + Gets or sets the of a SAML protocol message in response to which an attesting entity can + present the assertion. [Saml2Core, 2.4.1.2] + + + + + Gets a collection of which can be used to authenticate an attesting entity. [Saml2Core, 2.4.1.3] + + + + + Gets or sets a time instant before which the subject cannot be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a time instant at which the subject can no longer be confirmed. [Saml2Core, 2.4.1.2] + + + + + Gets or sets a URI specifying the entity or location to which an attesting entity can present + the assertion. [Saml2Core, 2.4.1.2] + + + + + Represents the SubjectLocality element specified in [Saml2Core, 2.7.2.1]. + + + This element is entirely advisory, since both of these fields are quite + easily "spoofed". [Saml2Core, 2.7.2.1] + + + + + Initializes an instance of . + + + + + Initializes an instance of from an address and DNS name. + + A indicating the address. + A indicating the DNS name. + + + + Gets or sets the network address of the system from which the principal identified + by the subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + Gets or sets the DNS name of the system from which the principal identified by the + subject was authenticated. [Saml2Core, 2.7.2.1] + + + + + The authentication information that an authority asserted when creating a token for a subject. + + + + + Initializes a new instance of the class. + + + + + Gets or sets the address of the authority that created the token. + + + + + Gets or sets the AuthenticationMethod + + + + + Gets or sets the AuthenticationInstant + + + + + Gets the collection of authority bindings. + + + + + Gets or sets the DNS name of the authority that created the token. + + + + + Gets or sets the time that the session referred to in the session index MUST be considered ended. + + + + + Gets or sets the session index that describes the session between the authority and the client. + + + + + Defines the keys for properties contained in . + + + + + This exception is thrown when a security is missing an ExpirationTime. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when reading a . + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Log messages and codes + + + + + Represents the Action element specified in [Saml, 2.4.5.1]. + see: https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf + + + + + Constructs an instance of class. + + Action value represented by this class. + if is null or empty. + + + + Constructs an instance of class. + + Value represented by this class. + Namespace in which the action is interpreted. + if is null or empty. + if is not an absolute Uri. + + + + Gets or sets a URI reference representing the namespace in which the name of the + specified action is to be interpreted. [Saml, 2.4.5.1] + + if is not an absolute Uri. + + + + Gets or sets the label for an action sought to be performed on the + specified resource. [Saml, 2.4.5.1] + + if is null or empty. + + + + Represents the Advice element specified in [Saml, 2.3.2.2]. + + + This information MAY be ignored by applications without affecting either + the semantics or the validity of the assertion. + + + + + Creates an instance of . + + + + + Creates an instance of . + + . + + + + Creates an instance of . + + + + + + Creates an instance of . + + . + . + + + + Gets a collection of representing the assertions in the . + + + + + Gets a collection of representating the assertions in the . + + + + + Represents the Assertion element specified in [Saml, 2.3.2]. + + + + + Creates an instance of . + + AssertionID of the assertion. + Issuer of the assertion. + IssueInstant of the assertion. + SamlConditions of the assertion. + SamlAdvice of the assertion. + . + + + + Gets or sets additional information related to the assertion that assists processing in certain + situations but which may be ignored by applications that do not understand the + advice or do not wish to make use of it. + + + + + Gets or sets the identifier for this assertion. + + + + + Gets or sets conditions that must be evaluated when assessing the validity of and/or + when using the assertion. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Gets or sets the issuer in the assertion. + + + + + Gets or sets the time instant of issue in UTC. + + + + + Gets the major version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets the minor version of this assertion. [Saml, 2.3.2] + + The identifier for the version of SAML defined in this specification is 1. + + + + + + Gets or sets the on the Assertion. + + + + + Gets or sets the used by the issuer to protect the integrity of the assertion. + + + + + Gets the (s) regarding the subject. + + + + + Represents the Attribute element. + + + + + Initializes a new instance of . + + + + + Initializes a new instance of s. + + The namespace of the attribute. + The name of the attribute. + The value of the attribute. + + + + Initializes a new instance of . + + The namespace of the attribute. + The name of the attribute. + . + if is null. + + + + Gets or sets the xsi:type of the values contained in the SAML Attribute. + + + + + Gets or sets the ClaimType of the attribute. + + + + + Gets or sets the name of the attribute. + + if 'value' is null or empty. + + + + Gets or sets the namespace of the attribute. + + + + + Gets or sets the string that represents the OriginalIssuer of the SAML Attribute. + + + + + Gets a collection of representing attributes. + + + + + Comparison class supporting multi-part keys for a dicitionary + + + + + A class contains Saml attribute key. + + + + + Represents the Saml Attribute Key. + + + + + + Override GetHashCode function. + + + + + + Compare AttributeKeys. + + + + + + + + Get the AttributeKey's hash code. + + + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The subject of the attribute statement. + The contained in this statement. + + + + Creates an instance of . + + The subject of the attribute statement. + . + + + + Gets a collection of . + + + + + Represents the AudienceRestrictionCondition. + + + + + Creates an instance of . + + The audience element contained in this restriction. + + + + Creates an instance of . + + An containing the audiences for a . + + + + Gets the of audiences for a . + + + + + Represents the AttributeStatement element. + + + + + Creates an instance of . + + The Subject of the Statement. + The URI reference that specifies the type of authentication that took place. + The time at which the authentication took place. + The DNS domain name for the system entity from which the subject was apparently authenticated. + The IP address for the system entity from which the subject was apparently authenticated. + . + + + + Gets or sets the instant of authentication. + + + + + Gets or sets the method of authentication. + + if 'value' is null or empty. + + + + Gets the collection of . + + + + + Gets or sets Domain Name Service address. + + + + + Gets or sets Internet Protocol address. + + + + + Represents the SamlAuthorityBinding specified in [Saml, 2.4.3.2]. + + + + + Create an instance of . + + The type of SAML protocol queries to which the authority described by this element will respond. + The URI identifying the SAML protocol binding to use in communicating with the authority. + The URI describing how to locate and communicate with the authority. + + + + Gets or sets the AuthorityKind of the binding. + + + + + Gets or sets the binding. + + + + + Gets or sets the location of the binding. + + + + + Represents the AuthorizationDecisionStatement specified in [Saml, 2.4.5]. + + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + + + + Initializes a new instance of class from + a resource and decision. + + The of the statement. + The resource to be authorized. + The AccessDecision in use. + . + Collection of specifications. + + + + Gets or sets the AccessDecision rendered by the SAML authority with respect to the specified resource. + + + + + Gets a collection of representing the action values contained in the AuthorizationDecisionStatement. + + + + + Gets the ClaimType. + + + + + Gets or sets the evidence contained in the AuthorizationDecisionStatement. + + + + + Gets or sets the resource contained in the AuthorizationDecisionStatement. + + + + + Saml Condition element. + + + + + Represents the Conditions element specified in [Saml, 2.3.2.1]. + + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + + + + Initializes a new instance of . + + The earliest time instant at which the assertion is valid + The time instant at which the assertion has expired. + . + + + + Gets a collection of that the assertion is addressed to. + + + + + Gets or sets the earliest time instant at which the assertion is valid. + + + + + Gets or sets the time instant at which the assertion has expired. + + + + + Contains constants related to SAML. + + + + + Known values for + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the SamlDoNotCacheCondition element. + + + + + Represents the Evidence element specified in [Saml, 2.4.5.2]. + + + Contains one or more assertions or assertion references that the SAML + authority relied on in issuing the authorization decision. + + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + + + + Initializes a new instance of class from a . + + . + . + + + + Gets a collection of . + + + + + Gets a collection of for use by the . + + + + + A security token backed by a SAML assertion. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + A to initialize from. + + + + Gets the for this token. + + + + + Gets the SecurityToken id. + + + + + Gets the issuer of this token + + + + + Gets the for this instance. + + + + + Gets or sets the that was used to Sign this assertion. + + + + + Gets the time the token is valid from. + + + + + Gets the time the token is valid to. + + + + + A designed for creating and validating Saml Tokens, + which supports validating tokens passed as strings using . + + + + + + Default lifetime of tokens created. When creating tokens, if 'expires' and 'notbefore' are both null, then a default will be set to: expires = DateTime.UtcNow, notbefore = DateTime.UtcNow + TimeSpan.FromMinutes(TokenLifetimeInMinutes). + + + + + Initializes an instance of . + + + + + Gets a value indicating whether this handler supports validation of tokens + handled by this instance. + v + 'true' if the instance is capable of SecurityToken + validation. + + + + Gets a value indicating whether the class provides serialization functionality to serialize securityToken handled + by this instance. + + true if the WriteToken method can serialize this securityToken. + + + + Gets or sets the SamlSubject comparer. + + + + + Gets or set the that will be used to read and write a . + + 'value' is null. + + + + Gets or sets a bool that controls if token creation will set default 'NotBefore', 'NotOnOrAfter' and 'IssueInstant' if not specified. + + See: , for defaults and configuration. + + + + Gets or sets the token lifetime in minutes. + + Used by to set the default expiration ('exp'). for the default. + 'value' less than 1. + + + + Gets the securityToken type supported by this handler. + + + + + Adds all Actors. + + . + Attribute collection to which the Actor added. + if is null. + + + + Determines if the string is a valid Saml token by examining the xml for the correct start element. + + A Saml token as a string. + 'true' if the string has a start element equal . + + + + Indicates whether the current XML element can be read as a token of the type handled by this instance. + + An reader positioned at a start element. The reader should not be advanced. + 'true' if can read the element. + + + + Collects attributes with a common claim type, claim value type, and original issuer into a single attribute with multiple values. + + to consolidate. + common attributes collected into value lists. + + + + Override this method to provide a SamlAdvice to place in the Samltoken. + + Contains information about the token. + SamlAdvice, default is null. + + + + Generates a SamlAttribute from a claim. + + Claim from which to generate a SamlAttribute. + + if the is null. + if the type of doesn't have "/" or only has "/" at the beginning or doesn't have any character(s) after the last "/". + + + + Creates SamlAttributeStatements and adds them to a collection. + Override this method to provide a custom implementation. + + Default behavior is to create a new SamlAttributeStatement for each Subject in the tokenDescriptor.Subjects collection. + + + The SamlSubject to use in the SamlAttributeStatement that are created. + Contains all the other information that is used in token issuance. + SamlAttributeStatement + if is null. + if is null. + + + + Creates a SamlAuthenticationStatement for each AuthenticationInformation found in AuthenticationInformation. + Override this method to provide a custom implementation. + + The SamlSubject of the Statement. + Contains all the other information that is used in token issuance. + SamlAuthenticationStatement + if is null. + if Assertion has one or more AuthenticationStatement, and one of AuthenticationMethod and authenticationInstant is null. + + + + Creates a from a . + + The token descriptor. + A . + By default a null statement is returned. Override to return a to be added to a . + + + + Creates claims from a Saml securityToken. + + A that will be used to create the claims. + The value to set + Contains parameters for validating the securityToken. + A containing the claims from the . + if is null. + if is null. + + + + Generates all the conditions for saml + + information that is used in token issuance. + SamlConditions + if is null. + + + + Generates an enumeration of SamlStatements from a SecurityTokenDescriptor. + Only SamlAttributeStatements and SamlAuthenticationStatements are generated. + Overwrite this method to customize the creation of statements. + + Calls in order (all are virtual): + 1. CreateSamlSubject + 2. CreateAttributeStatements + 3. CreateAuthenticationStatements + 4. CreateAuthorizationDecisionStatement + + + The SecurityTokenDescriptor to use to build the statements. + additional information for creating a . + An enumeration of SamlStatement. + if is null. + + + + Returns the SamlSubject to use for all the statements that will be created. + Overwrite this method to customize the creation of the SamlSubject. + + Contains all the information that is used in token issuance. + A SamlSubject created from the first subject found in the tokenDescriptor as follows: + + 1. Claim of Type NameIdentifier is searched. If found, SamlSubject.Name is set to claim.Value. + 2. If a non-null tokenDescriptor.proof is found then SamlSubject.KeyIdentifier = tokenDescriptor.Proof.KeyIdentifier AND SamlSubject.ConfirmationMethod is set to 'HolderOfKey'. + 3. If a null tokenDescriptor.proof is found then SamlSubject.ConfirmationMethod is set to 'BearerKey'. + + + if is null. + if the tokenDescriptor has more than one name identifier claim. + + + + Creates a based on a information contained in the . + + The that has creation information. + A instance. + If is null. + + + + Creates a based on a information contained in the . + + The that has creation information. + additional information for creating the . + A instance. + If is null. + + + + Builds an XML formated string from a collection of saml attributes that represent an Actor. + + . + A well formed XML string. + The string is of the form "<Actor><SamlAttribute name, ns><SamlAttributeValue>...</SamlAttributeValue>, ...</SamlAttribute>...</Actor>" + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + if Actor existing in both identity and attributes of statement. + + + + Creates claims from a . + + The . + A . + The issuer. + if is null. + if is null. + + + + Creates claims from a . + + The . + A . + The issuer. + Provided for extensibility. By default no claims are created. + + + + Creates claims from a unknow statements. + + The . + A + The issuer. + + + + Processes all statements to generate claims. + + A that will be used to create the claims. + The issuer. + Contains parameters for validating the securityToken. + A containing the claims from the . + if the statement is not a . + + + + Creates subject claims from the . + + The . + The subject. + The issuer. + if is null. + if is null. + if the doesn't have the name or confirmation methonds. + + + + Converts a string into an instance of . + + a Saml token as a string. + A + if is null or empty. + If 'token.Length' $gt; . + + + + Converts a string into an instance of . + + a Saml token as a string. + A + If is null or empty. + If 'token.Length' $gt; . + + + + Deserializes from XML a token of the type handled by this instance. + + An XML reader positioned at the token's start + element. + validation parameters for the . + An instance of . + + + + Returns a to use for validating the signature of a token. + + The representation of the token that is being validated. + The that is being validated. + that will be used during validation. + Returns a to use for signature validation. + If is null. + If is null. + If is null. + If key fails to resolve, then null is returned + + + + This method gets called when a special type of SamlAttribute is detected. The SamlAttribute passed in wraps a SamlAttribute + that contains a collection of AttributeValues, each of which are mapped to a claim. All of the claims will be returned + in an ClaimsIdentity with the specified issuer. + + The SamlAttribute to be processed. + The identity that should be modified to reflect the SamlAttribute. + Issuer Identity. + if we have two delegates acting as an identity, we do not allow this. + + + + Determines if the audiences found in a are valid. + + . + The being validated. + required for validation. + see for additional details. + + + + Validates the Lifetime and Audience conditions. + + a that contains the . + required for validation. + If is null or empty. + If is null. + If is null. + if the Condition 'OneTimeUse' is specified. Requires overriding. + if the Condition 'ProxyRestriction' is specified. Requires overriding. + + + + Determines if an issuer found in a is valid. + + The issuer to validate + The that is being validated. + required for validation. + The issuer to use when creating the (s) in the . + for additional details. + + + + Validates the was signed by a valid . + + The that signed the . + The being validated. + The current . + + + + Validates the lifetime of a . + + The value found in the . + The value found in the . + The being validated. + required for validation. + for additional details. + + + + Validates that the signature, if found is valid. + + A Saml token. + that will be used during validation. + If is null or whitespace. + If is null. + If returns null OR an object other than a . + If a signature is not found and is true. + If the 'token' has a key identifier and none of the (s) provided result in a validated signature. + This can indicate that a key refresh is required. + If after trying all the (s), none result in a validated signture AND the 'token' does not have a key identifier. + A that has had the signature validated if token was signed. + If the 'token' is signed, the signature is validated even if is false. + If the 'token' signature is validated, then the will be set to the key that signed the 'token'. It is the responsibility of to set the + + + + Validates the is an expected value. + + The that signed the . + The to validate. + The current . + If the is a then the X509Certificate2 will be validated using the CertificateValidator. + + + + Validates the token replay. + + expiration time of the + to validate + that will be used during validation + + + + Reads and validates a well formed . + + A string containing a well formed securityToken. + Contains data and information needed for validation. + The that was validated. + A generated from the claims in the Saml securityToken. + if is null or whitespace. + if is null. + if 'securityToken.Length' $gt; . + + + + Serializes a to a string. + + A . + if the is null. + if the token is not a . + + + + Serializes to XML a securityToken of the type handled by this instance. + + The XML writer. + A securityToken of type . + if the is null. + if the is null. + if the token is not a . + if is null. + + + + Reads and writes SamlAssertions + + + + + Instantiates a new instance of . + + + + + Gets or sets the to use for reading / writing the + + if value is null. + Passed to and . + + + + Gets or sets the prefix to use when writing xml. + + if value is null. + + + + Determines whether a URI is valid and can be created using the specified UriKind. + Uri.TryCreate is used here, which is more lax than Uri.IsWellFormedUriString. + The reason we use this function is because IsWellFormedUriString will reject valid URIs if they are IPv6 or require escaping. + + The string to check. + The type of URI (usually UriKind.Absolute) + True if the URI is valid, false otherwise. + + + + Read the <saml:Action> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Advice> element. + + + + The Advice element has an extensibility point to allow XML elements + from non-SAML namespaces to be included. By default, because the + Advice may be ignored without affecting the semantics of the + assertion, any such elements are ignored. To handle the processing + of those elements, override this method. + + + A positioned at a element. + A instance. + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Attribute> element. + + + The default implementation requires that the content of the + Attribute element be a simple string. To handle complex content + or content of declared simple types other than xs:string, override + this method. + + An positioned at a element. + A instance. + + + + Reads the <saml:AttributeStatement> element, or a + <saml:Statement element that specifies an xsi:type of + saml:AttributeStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:AudienceRestriction> element or a + <saml:Condition> element that specifies an xsi:type + of saml:AudienceRestrictionType. + + A positioned at a element. + + + + + Read the saml:AuthenticationStatement. + + XmlReader positioned at a saml:AuthenticationStatement. + SamlAuthenticationStatement + The input parameter 'reader' is null. + or the statement contains a unknown child element. + + + + Reads a <saml:Binding> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:AuthzDecisionStatement> element or a + <saml:Statement element that specifies an xsi:type of + saml:AuthzDecisionStatementType. + + A positioned at a element. + A instance. + + + + Reads the <saml:Condition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Conditions> element. + + + To handle custom <saml:Conditions> elements, override this + method. + + A positioned at a element. + A instance. + + + + Reads the <saml:DoNotCacheCondition> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Evidence> element. + + A positioned at a element. + A instance. + + + + Reads the <saml:Statement> element. + + A positioned at a element. + An instance of derived type. + + The default implementation only handles Statement elements which + specify an xsi:type of saml:AttributeStatementType, + saml:AuthnStatementType, and saml:AuthzDecisionStatementType. To + handle custom statements, override this method. + + + + + Read the SamlSubject from the XmlReader. + + A positioned at a element. + An instance of . + + + + Writes the <saml:Action> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Advice> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <Assertion> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null or empty. + if is not well formed. See . + if is null or empty. + if .Count == 0. + + + + Writes the <saml:Attribute> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if any attribute values are null or empty. + + + + Writes the <saml:AttributeStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if .Count == 0. + + + + Writes the <saml:AudienceRestriction> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + + + + Writes the <AuthenticationStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <AuthorityBinding> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is null. + if is null or empty. + if is null or empty. + + + + Writes the <saml:AuthzDecisionStatement> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if is empty. + if is null or empty. + if is null. + + + + Writes the <saml:Condition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + Writes a or a all others are skipped. + + + + Writes the <saml:Conditions> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:DoNotCacheCondition> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Evidence> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Writes one of the suppported Statements. + + A to serialize the . + The to serialize. + if is null. + if is null. + + + + Writes the <saml:Subject> element. + + A to serialize the . + The to serialize. + if is null. + if is null. + if does not contain any assertions or assertions references. + + + + Represents the StatementAbstractType specified in [Saml, 2.4]. + + + This abstract class provides no operations; however, this type is used + to declare collections of statements, for example SamlAssertion.Statements. + + + + + Represents the Subject element specified in [Saml2Core, 2.4.2.1]. + + + If the NameId is null and the SubjectConfirmations collection is empty, + an InvalidOperationException will be thrown during serialization. + + + + + Initialize an instance of . + + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + + + + Initialize an instance of . + + The format of the subject. + The NameIdentifier of the subject. + The name of the subject. + . + The confirmation data contained in the subject. + + + + Gets or sets confirmation data. + + + + + Gets confirmation methods. + + + + + Gets or sets the . + + + + + Gets or sets the. + + + + + Gets or sets the name of the Subject. + + + + + Gets the ClaimType. + + + + + Gets or sets the format of the Subject. + + + + + Gets or sets the name qualifier of the Subject. + + + + + Represents the SubjectStatement element. + + + + + Gets or sets the subject of the statement. + + +
+
diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/.signature.p7s b/packages/Microsoft.IdentityModel.Xml.5.2.4/.signature.p7s new file mode 100644 index 0000000..c4f2216 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/.signature.p7s differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/Microsoft.IdentityModel.Xml.5.2.4.nupkg b/packages/Microsoft.IdentityModel.Xml.5.2.4/Microsoft.IdentityModel.Xml.5.2.4.nupkg new file mode 100644 index 0000000..81eeec1 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/Microsoft.IdentityModel.Xml.5.2.4.nupkg differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.dll b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.dll new file mode 100644 index 0000000..bfcdb5f Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.dll differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.pdb b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.pdb new file mode 100644 index 0000000..f6a71d3 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.xml b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.xml new file mode 100644 index 0000000..c67bfb2 --- /dev/null +++ b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net45/Microsoft.IdentityModel.Xml.xml @@ -0,0 +1,1680 @@ + + + + Microsoft.IdentityModel.Xml + + + + + Defines a XML transform that applies C14n canonicalization and produces a hash over the transformed XML nodes. + + + + + Gets the algorithm + + + + + Gets or sets a value indicating if this transform should include comments. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Processes a set of XML nodes and returns the hash of the octets. + + the that has the XML nodes to process. + the to use + the hash of the processed XML nodes. + + + + Wraps a delegates to InnerReader. + + + + + Creates a new . + + + + + Gets or sets the Inner . + + + + + Gets the value of the InnerReaders's attribute with the specified index. + + index of the attribute. + Attribute value at the specified index. + + + + Gets the value of the InnerReaders's attribute with the specified Name. + + The qualified name of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the value of the InnerReaders's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the number of InnerReaders's attributes at the current reader position. + + + + + Gets the InnerReaders's base Uri of the current node. + + + + + Gets a value indicating if the InnerReader can read binary content + + + + + Gets a value indicating if the InnerReader can read value chunk. + + + + + Gets the InnerReaders's current depth. + + + + + Gets a value indicating if the InnerReader is positioned at the end of the stream. + + + + + Gets a value indicating if the InnerReader current node has a Value. + + + + + Gets a value indicating if the InnerReader's current node is an attribute that + was generated from the default value defined in the DTD or Schema. + + + + + Gets a value indicating if the InnerReader's current node is empty. + + + + + Gets the InnerReader's LineNumber + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LinePosition. + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LocalName of the current node. + + + + + Gets the InnerReader's Name of the current node. + + + + + Gets the InnerReader's NamespaceURI of the current node. + + + + + Gets the InnerReader's XmlNameTable at the current node. + + + + + Gets the type of the InnerReader's current node type. + + + + + Gets the prefix of the InnerReader's current node. + + + + + Gets the quotation mark character used to enclose the attribute node. (" or ') + + + + + Gets the InnerReader's ReadState. + + + + + Gets the Value of the InnerReader's current node. + + + + + Gets the ValueType of InnerReader's current node. + + + + + Gets the InnerReader's XmlLang. + + + + + Gets the InnerReader's XmlSpace. + + + + + Closes the reader and changes the System.Xml.XmlReader.ReadState + to Closed. + + + + + Gets the value of the InnerReader's attribute at the given index. + + The index of the attribute. The index is 0 based index. + The value of the attribute at the specified index. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name. + + The qualified name of the attribute. + The value of the attribute. If the attribute is not found null + is returned. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name and namespace Uri. + + The local name of the attribute. + The namespace of the attribute. + The value of the attribute. If the attribute is not found + null is returned. + The method does not move the reader. + + + + Gets a value indicating if the InnerReader HasLineInfo + + + + + Resolves the InnerReader's namespace prefix in the current element scope. + + Prefix whose namespace Uri to be resolved. + The namespace Uri to which the prefix matches or null if no matching + prefix is found. + + + + Moves to the InnerReader's attribute with the specified index. + + The index of the attribute. + + + + Moves to the InnerReader's attribute with the given local name. + + The qualified name of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves to the InnerReader's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves the InnerReader to a node of type Element. + + true if the reader is positioned on an element else false + + + + Moves the InnerReader to the first attribute. + + Returns true if the reader is positioned at a attribute else false. + When returning false the reader position will not be changed. + + + + Moves the InnerReader to the next attribute. + + Returns true if the reader is positioned at an attribute else false. + When returning false the reader position will not be changed. + + + + Reads the InnerReader's next node from the stream. + + true if the next node was read successfully. + + + + Parses the InnerReader's attribute value into one or more Text, EntityReference, or EndEntity nodes. + + true if there are nodes to return.false if the reader is not positioned on + an attribute node when the initial call is made or if all the attribute values + have been read. + + + + Reads the InnerReader's content and returns the Base64 decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Reads the InnerReader's content and returns the BinHex decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Resolves the InnerReader's EntityReference nodes. + + + + + Reads large streams of text embedded in an XML document from the InnerReader. + + The array of characters that serves as the buffer to which the text contents + are written. This value cannot be null. + The offset within the buffer where the System.Xml.XmlReader can start to + copy the results. + The maximum number of characters to copy into the buffer. The actual number + of characters copied is returned from this method. + The number of characters read into the buffer. The value zero is returned + when there is no more text content. + + + + Gets the + + if is null. + + + + Wraps a and delegates to InnerWriter. + + + + + Initializes a new instance of + + + + + Gets or sets a for tracing. + + if 'value' is null. + + + + Gets or sets the InnerWriter. + + if 'value' is null. + + + + Closes the underlying stream. + + + + + Flushes the underlying stream. + + + + + Encodes the specified binary bytes as Base64 and writes out the resulting text. + + Byte array to encode. + The position in the buffer indicating the start of the bytes to write. + The number of bytes to write. + + + + Writes out a CDATA block containing the specified text. + + The text to place inside the CDATA block. + + + + Forces the generation of a character entity for the specified Unicode character value. + + The Unicode character for which to generate a character entity. + + + + When overridden in a derived class, writes text one buffer at a time. + + Character array containing the text to write. + The position in the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes out a comment containing the specified text. + + Text to place inside the comment. + + + + Writes the DOCTYPE declaration with the specified name and optional attributes. + + The name of the DOCTYPE. This must be non-empty. + If non-null it also writes PUBLIC "pubid" "sysid" where pubid and sysid are + replaced with the value of the given arguments. + If pubid is null and sysid is non-null it writes SYSTEM "sysid" where sysid + is replaced with the value of this argument. + If non-null it writes [subset] where subset is replaced with the value of + this argument. + + + + Closes the previous System.Xml.XmlWriter.WriteStartAttribute(System.String,System.String) call. + + + + + Closes any open elements or attributes and puts the writer back in the Start state. + + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out an entity reference as name. + + The name of the entity reference. + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out a processing instruction with a space between the name and text as follows: <?name text?>. + + The name of the processing instruction. + The text to include in the processing instruction. + + + + When overridden in a derived class, writes raw markup manually from a character buffer. + + Character array containing the text to write. + The position within the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes raw markup manually from a string. + + String containing the text to write. + + + + Writes the start of an attribute with the specified local name and namespace URI. + + The namespace prefix of the attribute. + The local name of the attribute. + The namespace URI for the attribute. + + + + When overridden in a derived class, writes the XML declaration with the version "1.0". + + + + + When overridden in a derived class, writes the XML declaration with the version + "1.0" and the standalone attribute. + + If true, it writes "standalone=yes"; if false, it writes "standalone=no". + + + + When overridden in a derived class, writes the specified start tag and associates + it with the given namespace and prefix. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + When overridden in a derived class, gets the state of the writer. + + + + + Writes the given text content. + + The text to write. + + + + Generates and writes the surrogate character entity for the surrogate character pair. + + The low surrogate. This must be a value between 0xDC00 and 0xDFFF. + The high surrogate. This must be a value between 0xD800 and 0xDBFF. + + + + Writes out the given white space. + + The string of white space characters. + + + + Writes an attribute as a xml attribute with the prefix 'xml:'. + + Localname of the attribute. + Attribute value. + + + + Writes an xmlns namespace declaration. + + The prefix of the namespace declaration. + The namespace Uri itself. + + + + Returns the closest prefix defined in the current namespace scope for the namespace URI. + + The namespace URI whose prefix to find. + The matching prefix or null if no matching namespace URI is found in the + current scope. + + + + Gets the + + if is null. + + + + Base class for a XmlDsig element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/ + + + + + Initializes a instance. + + + + + Gets or sets the Id. + + + + + Gets or sets the prefix associated with the element. + + + + + Reads and writes XML associated with XML DSig https://www.w3.org/TR/2001/PR-xmldsig-core-20010820 + + + + + Returns the default instance. + + + + + Static constructor that initializes the default . + + + + + Initializes an instance of + + + + + Gets or sets the prefix to use when writing the Signature element. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + pointing positioned on a <KeyInfo> element. + if is null. + if there is a problem reading the XML. + Only handles IssuerSerial, Ski, SubjectName, Certificate. Unsupported types are skipped. Only a X509 data element is supported. + + + + Reads the "X509DataElement" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "X509IssuerSerial" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "RSAKeyValue" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-RSAKeyValue. + + A positioned on a element. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + a positioned on a <Signature> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + a positioned on a <SignedInfo> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + a positioned on a <Reference> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Transforms + + a positioned on a <Transforms> element. + a to attach transforms. + if is null. + if is null. + if there is a problem reading the XML. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignatureMethod + + a positioned on a <SignatureMethod> element. + if is null. + if there is a problem reading the XML. + A string with the signature method. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-CanonicalizationMethod + + a positioned on a <CanonicalizationMethod> element. + if is null. + if there is a problem reading the XML. + A string with the canonicalization method. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo. + + the to use. + the to write. + if is null. + if is null. + if there is a problem writing the XML. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference. + + the to use. + the to write. + Assumes the <DigestValue> has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null or empty. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature. + + the to use. + the to write. + Assumes the <SignatureValue> has been calculated, no canonicalization or signature calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo. + + the to use. + the to write. + Assumes the <Reference> digest has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if .Count > 1. + if is null or empty. + + + + Gets or sets the to use when processing transforms in References + + + + + Wraps a pointing to a root element of XML that may contain a signature. + If a Signature element is found, a will be populated and will + have set for future validation. + + + + + Initializes an instance of + + a pointing to XML that may contain an enveloped signature. + If a <Signature> element is found, the will be set. + if is null. + + + + Gets or sets the to use when reading XmlDSig elements. + + if 'value' is null. + + + + Called after the root element has been completely read. + Attaches a to the first Reference for future processing if + a signature was found. + + + + + Keeps track of the XML Element count. If a signature is detected it is read. + + 'true' if the next node was read successfully; 'false' if there are no more nodes. + if more than one signature is found. + if a <Reference> element was not found in the <SignedInfo>. + + + + Gets the that was found inside the XML. + + may be null. + + + + Defines a XML transform that removes the XML nodes associated with the Signature. + + + + + Creates an EnvelopedSignatureTransform + + + + + Gets the Algorithm associated with this transform + + + + + Sets the reader to exclude the <Signature> element + + to process. + with exclusion set. + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Represents an exception thrown when processing xml. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs reading XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when a problem occurs when validating the XML <Signature>. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs writing XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents Canonicalization algorithms found in <SignedInfo> and in <Reference>. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + controls if the transform will include comments. + + + + Gets the Algorithm associated with this transform + + + + + Applies a canonicalization transform over a set of XML nodes and computes the hash value. + + the set of XML nodes to transform. + the hash algorithm to apply. + the hash of the transformed octets. + + + + Represents the IssuerSerial property of X509Data as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + + + + Gets the IssuerName of the IssuerSerial. + + + + + Gets the SerialNumber of the IssuerSerial. + + + + + Creates an IssuerSerial using the specified IssuerName and SerialNumber. + + + + + Compares two IssuerSerial objects. + + + + + Serves as a hash function for IssuerSerial. + + + + + Represents a XmlDsig KeyInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + Only a single 'X509Certificate' is supported. Multiples that include intermediate and root certs are not supported. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + the to populate the X509Data. + + + + Initializes an instance of . + + the to populate the . + + + + Gets or sets the 'KeyName' that can be used as a key identifier. + + + + + Gets or sets the Uri associated with the RetrievalMethod + + + + + Gets or sets the RSAKeyValue. + + + + + Gets the 'X509Data' value. + + + + + Compares two KeyInfo objects. + + + + + Serves as a hash function for KeyInfo. + + + + + Returns true if the KeyInfo object can be matched with the specified SecurityKey, returns false otherwise. + + + + + Log messages and codes for XmlProcessing + + + + + Represents a XmlDsig Reference element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + + + + Initializes an instance of + + + + + Initializes an instance of + + the to apply. + the to use. + if is null. + if is null. + + + + Gets or sets the CanonicalizingTransform + + if 'value' is null. + + + + Gets or sets the DigestMethod to use when creating the hash. + + if 'value' is null or empty. + + + + Gets or sets the Base64 encoding of the hashed octets. + + if 'value' is null or empty. + + + + Gets or sets the that is associated with the . + + if 'value' is null. + + + + Gets the of transforms to apply. + + + + + Gets or sets the Type of this Reference. + + + + + Gets or sets the Uri of this Reference. + + + + + Verifies that the equals the hashed value of the after + have been applied. + + supplies the . + if is null. + + + + Writes into a stream and then hashes the bytes. + + the set of XML nodes to read. + the hash algorithm to apply. + hash of the octets. + + + + Computes the digest of this reference by applying the transforms over the tokenStream. + + the that will supply the . + The digest over the after all transforms have been applied. + if is null. + if is null. + if is not supported. + if .CreateHashAlgorithm returns null. + + + + The RSAKeyValue found inside of the KeyValue element. + + + + + The modulus of the RSAKeyValue. + + + + + The exponent of the RSAKeyValue. + + + + + Creates an RSAKeyValue using the specified modulus and exponent. + + + + + Compares two RSAKeyValue objects. + + + + + Serves as a hash function for RSAKeyValue. + + + + + Represents a XmlDsig Signature element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + + + + Initializes a instance. + + + + + Initializes a instance. + + associated with this Signature. + if if null. + + + + Gets or sets the KeyInfo + + + + + Gets or sets the SignatureValue + + if 'value' is null or empty. + + + + Gets or sets the . + + if 'value' is null. + + + + Verifies the signature over the SignedInfo. + + the to use for cryptographic operations. + the to obtain cryptographic operators. + if is null. + if is null. + if null. + if is not supported. + if signature does not validate. + + + + Represents a XmlDsig SignedInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + + + + Initializes a instance. + + + + + Initializes a instance. + + a to include. + if is null. + + + + Gets or sets the CanonicalizationMethod + + if 'value' is null. + if 'value' is not one of: + "http://www.w3.org/2001/10/xml-exc-c14n#" + "http://www.w3.org/2001/10/xml-exc-c14n#WithComments" + + + + + Gets or sets the Reference. + + if 'value' is null. + + + + Gets or sets the SignatureMethod. + + if 'value' is null. + + + + Verifies the digest of all . + + supplies any required cryptographic operators. + if is null. + + + + Writes the Canonicalized bytes into a stream. + + the to receive the bytes. + + + + Defines a XMLTransform + + + + + Called to transform a + + the to process. + + + + + Gets the algorithm + + + + + + + + + Static constructor that initializes the default . + + + + + Gets the default instance of + + + + + Determine if the transform is supported. + + the name of the transform. + if the transform is supported + + + + Determine if the canonicalizing transform is supported. + + the name of the canonicalizing transform. + if the canonicalizing transform is supported + + + + Gets a XML transform that modifies a XmlTokenStream. + + the name of the transform. + + + + + Gets a XML transform that is capable of Canonicalizing XML and returning bytes. + + the name of the transform. + + + + + Represents a XmlDsig X509Data element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + Supports multiple certificates. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + If 'certificate' is null + + + + Initializes an instance of . + + If 'certificates' is null + + + + Gets or sets the 'X509IssuerSerial' that is part of a 'X509Data'. + + + + + Gets or sets the 'X509SKI' value that is a part of 'X509Data'. + + + + + Get or sets the 'X509SubjectName' value that is a part of 'X509Data'. + + + + + Get the collection of X509Certificates that is associated with 'X509Data'. + + + + + Get or sets the 'CRL' value that is a part of 'X509Data'. + + + + + Compares two X509Data objects. + + + + + Serves as a hash function for X509Data. + + + + + Constants for XML Signature + Definitions for namespace, attributes and elements as defined in http://www.w3.org/TR/xmldsig-core/ + + + + + Maintains a collection of XML nodes obtained when reading signed XML. + + + + + Initializes a + + + + + Adds a XML node to the collection. + + + + if is null. + + + + Adds a XML attribute node to the collection + + the XML prefix. + the local name of the attribute. + the namespace of the attribute. + the value of the attribute. + if is null or empty. + + + + Adds a XML element node to the collection + + the XML prefix. + the local name of the element. + the namespace of the attribute. + value indicating if the element is empty. + if is null or empty. + + + + Sets the name and namespace of which element to exclude. Normally this is the <Signature> element. + + the name of the Element to exclude. + the namespace of the Element to exclude. + if is null or empty. + + + + Writes the XML nodes into the . + + the to use. + if is null. + + + + An XmlReader that captures xml as a XmlTokenStream + + + + + Initializes a new instance of for creating a . + + an to capture the . + if if null. + if .IsStartElement() is false. + + + + Gets the + + + + + Delegates to InnerReader, then calls Record() + + + + + Utilities for working with XML + + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at at expected element. + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + the expected namespace. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at expected element. + + + + Determine if reader is at expected element in one of the listed namespace in namespaceList. + + the to check. + the expected element. + the expected namespace list. + if is at expected element. + if is null. + if is null or empty. + + + + Determines if a Qualified names equals a name / namespace pair. + + the to compare. + the name to compare. + the namepace to compare. + + + + + + + + Hex representation of bytes + + + + Gets the xsi:type as a for the current element. + + an pointing at an Element. + if is null. + a if the current element has an XSI type. + If is not on an element OR xsi type is not found, null. + + + + Determines if the has an attribute that is 'nil' + + a positioned on an element. + if is null. + true is the attribute value is 'nil' + + + + Normalizes an empty string to 'null'. + + + null if string is null or empty. + + + + Returns a new with message including the element and attribute. + + the missing element. + the missing attribute. + a . + + + + Determines if the prefix on a name maps to a namespace that is in scope the reader. + + the in scope. + the qualifiedName to check. + if is null. + if is null. + a with the namespace that was in scope. If the prefix was not in scope, the namespace will be null. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + if is null. + if is null. + if is null. + if the does require an xsi:type attribute to be present. If the xsi:type is present, it will be validated. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + controls if the xsi:type must be present. + if is null. + if is null. + if is null. + if xsi:type is not found and required. + if xsi:type is found and did not match expected. + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.dll b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.dll new file mode 100644 index 0000000..b2522dd Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.dll differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.pdb b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.pdb new file mode 100644 index 0000000..f6a71d3 Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.xml b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.xml new file mode 100644 index 0000000..c67bfb2 --- /dev/null +++ b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/net451/Microsoft.IdentityModel.Xml.xml @@ -0,0 +1,1680 @@ + + + + Microsoft.IdentityModel.Xml + + + + + Defines a XML transform that applies C14n canonicalization and produces a hash over the transformed XML nodes. + + + + + Gets the algorithm + + + + + Gets or sets a value indicating if this transform should include comments. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Processes a set of XML nodes and returns the hash of the octets. + + the that has the XML nodes to process. + the to use + the hash of the processed XML nodes. + + + + Wraps a delegates to InnerReader. + + + + + Creates a new . + + + + + Gets or sets the Inner . + + + + + Gets the value of the InnerReaders's attribute with the specified index. + + index of the attribute. + Attribute value at the specified index. + + + + Gets the value of the InnerReaders's attribute with the specified Name. + + The qualified name of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the value of the InnerReaders's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the number of InnerReaders's attributes at the current reader position. + + + + + Gets the InnerReaders's base Uri of the current node. + + + + + Gets a value indicating if the InnerReader can read binary content + + + + + Gets a value indicating if the InnerReader can read value chunk. + + + + + Gets the InnerReaders's current depth. + + + + + Gets a value indicating if the InnerReader is positioned at the end of the stream. + + + + + Gets a value indicating if the InnerReader current node has a Value. + + + + + Gets a value indicating if the InnerReader's current node is an attribute that + was generated from the default value defined in the DTD or Schema. + + + + + Gets a value indicating if the InnerReader's current node is empty. + + + + + Gets the InnerReader's LineNumber + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LinePosition. + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LocalName of the current node. + + + + + Gets the InnerReader's Name of the current node. + + + + + Gets the InnerReader's NamespaceURI of the current node. + + + + + Gets the InnerReader's XmlNameTable at the current node. + + + + + Gets the type of the InnerReader's current node type. + + + + + Gets the prefix of the InnerReader's current node. + + + + + Gets the quotation mark character used to enclose the attribute node. (" or ') + + + + + Gets the InnerReader's ReadState. + + + + + Gets the Value of the InnerReader's current node. + + + + + Gets the ValueType of InnerReader's current node. + + + + + Gets the InnerReader's XmlLang. + + + + + Gets the InnerReader's XmlSpace. + + + + + Closes the reader and changes the System.Xml.XmlReader.ReadState + to Closed. + + + + + Gets the value of the InnerReader's attribute at the given index. + + The index of the attribute. The index is 0 based index. + The value of the attribute at the specified index. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name. + + The qualified name of the attribute. + The value of the attribute. If the attribute is not found null + is returned. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name and namespace Uri. + + The local name of the attribute. + The namespace of the attribute. + The value of the attribute. If the attribute is not found + null is returned. + The method does not move the reader. + + + + Gets a value indicating if the InnerReader HasLineInfo + + + + + Resolves the InnerReader's namespace prefix in the current element scope. + + Prefix whose namespace Uri to be resolved. + The namespace Uri to which the prefix matches or null if no matching + prefix is found. + + + + Moves to the InnerReader's attribute with the specified index. + + The index of the attribute. + + + + Moves to the InnerReader's attribute with the given local name. + + The qualified name of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves to the InnerReader's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves the InnerReader to a node of type Element. + + true if the reader is positioned on an element else false + + + + Moves the InnerReader to the first attribute. + + Returns true if the reader is positioned at a attribute else false. + When returning false the reader position will not be changed. + + + + Moves the InnerReader to the next attribute. + + Returns true if the reader is positioned at an attribute else false. + When returning false the reader position will not be changed. + + + + Reads the InnerReader's next node from the stream. + + true if the next node was read successfully. + + + + Parses the InnerReader's attribute value into one or more Text, EntityReference, or EndEntity nodes. + + true if there are nodes to return.false if the reader is not positioned on + an attribute node when the initial call is made or if all the attribute values + have been read. + + + + Reads the InnerReader's content and returns the Base64 decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Reads the InnerReader's content and returns the BinHex decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Resolves the InnerReader's EntityReference nodes. + + + + + Reads large streams of text embedded in an XML document from the InnerReader. + + The array of characters that serves as the buffer to which the text contents + are written. This value cannot be null. + The offset within the buffer where the System.Xml.XmlReader can start to + copy the results. + The maximum number of characters to copy into the buffer. The actual number + of characters copied is returned from this method. + The number of characters read into the buffer. The value zero is returned + when there is no more text content. + + + + Gets the + + if is null. + + + + Wraps a and delegates to InnerWriter. + + + + + Initializes a new instance of + + + + + Gets or sets a for tracing. + + if 'value' is null. + + + + Gets or sets the InnerWriter. + + if 'value' is null. + + + + Closes the underlying stream. + + + + + Flushes the underlying stream. + + + + + Encodes the specified binary bytes as Base64 and writes out the resulting text. + + Byte array to encode. + The position in the buffer indicating the start of the bytes to write. + The number of bytes to write. + + + + Writes out a CDATA block containing the specified text. + + The text to place inside the CDATA block. + + + + Forces the generation of a character entity for the specified Unicode character value. + + The Unicode character for which to generate a character entity. + + + + When overridden in a derived class, writes text one buffer at a time. + + Character array containing the text to write. + The position in the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes out a comment containing the specified text. + + Text to place inside the comment. + + + + Writes the DOCTYPE declaration with the specified name and optional attributes. + + The name of the DOCTYPE. This must be non-empty. + If non-null it also writes PUBLIC "pubid" "sysid" where pubid and sysid are + replaced with the value of the given arguments. + If pubid is null and sysid is non-null it writes SYSTEM "sysid" where sysid + is replaced with the value of this argument. + If non-null it writes [subset] where subset is replaced with the value of + this argument. + + + + Closes the previous System.Xml.XmlWriter.WriteStartAttribute(System.String,System.String) call. + + + + + Closes any open elements or attributes and puts the writer back in the Start state. + + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out an entity reference as name. + + The name of the entity reference. + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out a processing instruction with a space between the name and text as follows: <?name text?>. + + The name of the processing instruction. + The text to include in the processing instruction. + + + + When overridden in a derived class, writes raw markup manually from a character buffer. + + Character array containing the text to write. + The position within the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes raw markup manually from a string. + + String containing the text to write. + + + + Writes the start of an attribute with the specified local name and namespace URI. + + The namespace prefix of the attribute. + The local name of the attribute. + The namespace URI for the attribute. + + + + When overridden in a derived class, writes the XML declaration with the version "1.0". + + + + + When overridden in a derived class, writes the XML declaration with the version + "1.0" and the standalone attribute. + + If true, it writes "standalone=yes"; if false, it writes "standalone=no". + + + + When overridden in a derived class, writes the specified start tag and associates + it with the given namespace and prefix. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + When overridden in a derived class, gets the state of the writer. + + + + + Writes the given text content. + + The text to write. + + + + Generates and writes the surrogate character entity for the surrogate character pair. + + The low surrogate. This must be a value between 0xDC00 and 0xDFFF. + The high surrogate. This must be a value between 0xD800 and 0xDBFF. + + + + Writes out the given white space. + + The string of white space characters. + + + + Writes an attribute as a xml attribute with the prefix 'xml:'. + + Localname of the attribute. + Attribute value. + + + + Writes an xmlns namespace declaration. + + The prefix of the namespace declaration. + The namespace Uri itself. + + + + Returns the closest prefix defined in the current namespace scope for the namespace URI. + + The namespace URI whose prefix to find. + The matching prefix or null if no matching namespace URI is found in the + current scope. + + + + Gets the + + if is null. + + + + Base class for a XmlDsig element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/ + + + + + Initializes a instance. + + + + + Gets or sets the Id. + + + + + Gets or sets the prefix associated with the element. + + + + + Reads and writes XML associated with XML DSig https://www.w3.org/TR/2001/PR-xmldsig-core-20010820 + + + + + Returns the default instance. + + + + + Static constructor that initializes the default . + + + + + Initializes an instance of + + + + + Gets or sets the prefix to use when writing the Signature element. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + pointing positioned on a <KeyInfo> element. + if is null. + if there is a problem reading the XML. + Only handles IssuerSerial, Ski, SubjectName, Certificate. Unsupported types are skipped. Only a X509 data element is supported. + + + + Reads the "X509DataElement" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "X509IssuerSerial" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "RSAKeyValue" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-RSAKeyValue. + + A positioned on a element. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + a positioned on a <Signature> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + a positioned on a <SignedInfo> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + a positioned on a <Reference> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Transforms + + a positioned on a <Transforms> element. + a to attach transforms. + if is null. + if is null. + if there is a problem reading the XML. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignatureMethod + + a positioned on a <SignatureMethod> element. + if is null. + if there is a problem reading the XML. + A string with the signature method. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-CanonicalizationMethod + + a positioned on a <CanonicalizationMethod> element. + if is null. + if there is a problem reading the XML. + A string with the canonicalization method. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo. + + the to use. + the to write. + if is null. + if is null. + if there is a problem writing the XML. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference. + + the to use. + the to write. + Assumes the <DigestValue> has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null or empty. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature. + + the to use. + the to write. + Assumes the <SignatureValue> has been calculated, no canonicalization or signature calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo. + + the to use. + the to write. + Assumes the <Reference> digest has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if .Count > 1. + if is null or empty. + + + + Gets or sets the to use when processing transforms in References + + + + + Wraps a pointing to a root element of XML that may contain a signature. + If a Signature element is found, a will be populated and will + have set for future validation. + + + + + Initializes an instance of + + a pointing to XML that may contain an enveloped signature. + If a <Signature> element is found, the will be set. + if is null. + + + + Gets or sets the to use when reading XmlDSig elements. + + if 'value' is null. + + + + Called after the root element has been completely read. + Attaches a to the first Reference for future processing if + a signature was found. + + + + + Keeps track of the XML Element count. If a signature is detected it is read. + + 'true' if the next node was read successfully; 'false' if there are no more nodes. + if more than one signature is found. + if a <Reference> element was not found in the <SignedInfo>. + + + + Gets the that was found inside the XML. + + may be null. + + + + Defines a XML transform that removes the XML nodes associated with the Signature. + + + + + Creates an EnvelopedSignatureTransform + + + + + Gets the Algorithm associated with this transform + + + + + Sets the reader to exclude the <Signature> element + + to process. + with exclusion set. + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Represents an exception thrown when processing xml. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs reading XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when a problem occurs when validating the XML <Signature>. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs writing XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents Canonicalization algorithms found in <SignedInfo> and in <Reference>. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + controls if the transform will include comments. + + + + Gets the Algorithm associated with this transform + + + + + Applies a canonicalization transform over a set of XML nodes and computes the hash value. + + the set of XML nodes to transform. + the hash algorithm to apply. + the hash of the transformed octets. + + + + Represents the IssuerSerial property of X509Data as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + + + + Gets the IssuerName of the IssuerSerial. + + + + + Gets the SerialNumber of the IssuerSerial. + + + + + Creates an IssuerSerial using the specified IssuerName and SerialNumber. + + + + + Compares two IssuerSerial objects. + + + + + Serves as a hash function for IssuerSerial. + + + + + Represents a XmlDsig KeyInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + Only a single 'X509Certificate' is supported. Multiples that include intermediate and root certs are not supported. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + the to populate the X509Data. + + + + Initializes an instance of . + + the to populate the . + + + + Gets or sets the 'KeyName' that can be used as a key identifier. + + + + + Gets or sets the Uri associated with the RetrievalMethod + + + + + Gets or sets the RSAKeyValue. + + + + + Gets the 'X509Data' value. + + + + + Compares two KeyInfo objects. + + + + + Serves as a hash function for KeyInfo. + + + + + Returns true if the KeyInfo object can be matched with the specified SecurityKey, returns false otherwise. + + + + + Log messages and codes for XmlProcessing + + + + + Represents a XmlDsig Reference element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + + + + Initializes an instance of + + + + + Initializes an instance of + + the to apply. + the to use. + if is null. + if is null. + + + + Gets or sets the CanonicalizingTransform + + if 'value' is null. + + + + Gets or sets the DigestMethod to use when creating the hash. + + if 'value' is null or empty. + + + + Gets or sets the Base64 encoding of the hashed octets. + + if 'value' is null or empty. + + + + Gets or sets the that is associated with the . + + if 'value' is null. + + + + Gets the of transforms to apply. + + + + + Gets or sets the Type of this Reference. + + + + + Gets or sets the Uri of this Reference. + + + + + Verifies that the equals the hashed value of the after + have been applied. + + supplies the . + if is null. + + + + Writes into a stream and then hashes the bytes. + + the set of XML nodes to read. + the hash algorithm to apply. + hash of the octets. + + + + Computes the digest of this reference by applying the transforms over the tokenStream. + + the that will supply the . + The digest over the after all transforms have been applied. + if is null. + if is null. + if is not supported. + if .CreateHashAlgorithm returns null. + + + + The RSAKeyValue found inside of the KeyValue element. + + + + + The modulus of the RSAKeyValue. + + + + + The exponent of the RSAKeyValue. + + + + + Creates an RSAKeyValue using the specified modulus and exponent. + + + + + Compares two RSAKeyValue objects. + + + + + Serves as a hash function for RSAKeyValue. + + + + + Represents a XmlDsig Signature element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + + + + Initializes a instance. + + + + + Initializes a instance. + + associated with this Signature. + if if null. + + + + Gets or sets the KeyInfo + + + + + Gets or sets the SignatureValue + + if 'value' is null or empty. + + + + Gets or sets the . + + if 'value' is null. + + + + Verifies the signature over the SignedInfo. + + the to use for cryptographic operations. + the to obtain cryptographic operators. + if is null. + if is null. + if null. + if is not supported. + if signature does not validate. + + + + Represents a XmlDsig SignedInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + + + + Initializes a instance. + + + + + Initializes a instance. + + a to include. + if is null. + + + + Gets or sets the CanonicalizationMethod + + if 'value' is null. + if 'value' is not one of: + "http://www.w3.org/2001/10/xml-exc-c14n#" + "http://www.w3.org/2001/10/xml-exc-c14n#WithComments" + + + + + Gets or sets the Reference. + + if 'value' is null. + + + + Gets or sets the SignatureMethod. + + if 'value' is null. + + + + Verifies the digest of all . + + supplies any required cryptographic operators. + if is null. + + + + Writes the Canonicalized bytes into a stream. + + the to receive the bytes. + + + + Defines a XMLTransform + + + + + Called to transform a + + the to process. + + + + + Gets the algorithm + + + + + + + + + Static constructor that initializes the default . + + + + + Gets the default instance of + + + + + Determine if the transform is supported. + + the name of the transform. + if the transform is supported + + + + Determine if the canonicalizing transform is supported. + + the name of the canonicalizing transform. + if the canonicalizing transform is supported + + + + Gets a XML transform that modifies a XmlTokenStream. + + the name of the transform. + + + + + Gets a XML transform that is capable of Canonicalizing XML and returning bytes. + + the name of the transform. + + + + + Represents a XmlDsig X509Data element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + Supports multiple certificates. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + If 'certificate' is null + + + + Initializes an instance of . + + If 'certificates' is null + + + + Gets or sets the 'X509IssuerSerial' that is part of a 'X509Data'. + + + + + Gets or sets the 'X509SKI' value that is a part of 'X509Data'. + + + + + Get or sets the 'X509SubjectName' value that is a part of 'X509Data'. + + + + + Get the collection of X509Certificates that is associated with 'X509Data'. + + + + + Get or sets the 'CRL' value that is a part of 'X509Data'. + + + + + Compares two X509Data objects. + + + + + Serves as a hash function for X509Data. + + + + + Constants for XML Signature + Definitions for namespace, attributes and elements as defined in http://www.w3.org/TR/xmldsig-core/ + + + + + Maintains a collection of XML nodes obtained when reading signed XML. + + + + + Initializes a + + + + + Adds a XML node to the collection. + + + + if is null. + + + + Adds a XML attribute node to the collection + + the XML prefix. + the local name of the attribute. + the namespace of the attribute. + the value of the attribute. + if is null or empty. + + + + Adds a XML element node to the collection + + the XML prefix. + the local name of the element. + the namespace of the attribute. + value indicating if the element is empty. + if is null or empty. + + + + Sets the name and namespace of which element to exclude. Normally this is the <Signature> element. + + the name of the Element to exclude. + the namespace of the Element to exclude. + if is null or empty. + + + + Writes the XML nodes into the . + + the to use. + if is null. + + + + An XmlReader that captures xml as a XmlTokenStream + + + + + Initializes a new instance of for creating a . + + an to capture the . + if if null. + if .IsStartElement() is false. + + + + Gets the + + + + + Delegates to InnerReader, then calls Record() + + + + + Utilities for working with XML + + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at at expected element. + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + the expected namespace. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at expected element. + + + + Determine if reader is at expected element in one of the listed namespace in namespaceList. + + the to check. + the expected element. + the expected namespace list. + if is at expected element. + if is null. + if is null or empty. + + + + Determines if a Qualified names equals a name / namespace pair. + + the to compare. + the name to compare. + the namepace to compare. + + + + + + + + Hex representation of bytes + + + + Gets the xsi:type as a for the current element. + + an pointing at an Element. + if is null. + a if the current element has an XSI type. + If is not on an element OR xsi type is not found, null. + + + + Determines if the has an attribute that is 'nil' + + a positioned on an element. + if is null. + true is the attribute value is 'nil' + + + + Normalizes an empty string to 'null'. + + + null if string is null or empty. + + + + Returns a new with message including the element and attribute. + + the missing element. + the missing attribute. + a . + + + + Determines if the prefix on a name maps to a namespace that is in scope the reader. + + the in scope. + the qualifiedName to check. + if is null. + if is null. + a with the namespace that was in scope. If the prefix was not in scope, the namespace will be null. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + if is null. + if is null. + if is null. + if the does require an xsi:type attribute to be present. If the xsi:type is present, it will be validated. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + controls if the xsi:type must be present. + if is null. + if is null. + if is null. + if xsi:type is not found and required. + if xsi:type is found and did not match expected. + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.dll b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.dll new file mode 100644 index 0000000..27a278d Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.dll differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.pdb b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.pdb new file mode 100644 index 0000000..bfb3cda Binary files /dev/null and b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.pdb differ diff --git a/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.xml b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.xml new file mode 100644 index 0000000..4db2473 --- /dev/null +++ b/packages/Microsoft.IdentityModel.Xml.5.2.4/lib/netstandard1.4/Microsoft.IdentityModel.Xml.xml @@ -0,0 +1,1664 @@ + + + + Microsoft.IdentityModel.Xml + + + + + Defines a XML transform that applies C14n canonicalization and produces a hash over the transformed XML nodes. + + + + + Gets the algorithm + + + + + Gets or sets a value indicating if this transform should include comments. + + + + + Gets or sets the a PrefixList to use when there is a need to include InclusiveNamespaces writing token. + + + + + Processes a set of XML nodes and returns the hash of the octets. + + the that has the XML nodes to process. + the to use + the hash of the processed XML nodes. + + + + Wraps a delegates to InnerReader. + + + + + Creates a new . + + + + + Gets or sets the Inner . + + + + + Gets the value of the InnerReaders's attribute with the specified index. + + index of the attribute. + Attribute value at the specified index. + + + + Gets the value of the InnerReaders's attribute with the specified Name. + + The qualified name of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the value of the InnerReaders's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + The value of the specified attribute. If the attribute is not found, + null is returned. + + + + Gets the number of InnerReaders's attributes at the current reader position. + + + + + Gets the InnerReaders's base Uri of the current node. + + + + + Gets a value indicating if the InnerReader can read binary content + + + + + Gets a value indicating if the InnerReader can read value chunk. + + + + + Gets the InnerReaders's current depth. + + + + + Gets a value indicating if the InnerReader is positioned at the end of the stream. + + + + + Gets a value indicating if the InnerReader current node has a Value. + + + + + Gets a value indicating if the InnerReader's current node is an attribute that + was generated from the default value defined in the DTD or Schema. + + + + + Gets a value indicating if the InnerReader's current node is empty. + + + + + Gets the InnerReader's LineNumber + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LinePosition. + + If the InnerReader does not support 1 is returned. + + + + Gets the InnerReader's LocalName of the current node. + + + + + Gets the InnerReader's Name of the current node. + + + + + Gets the InnerReader's NamespaceURI of the current node. + + + + + Gets the InnerReader's XmlNameTable at the current node. + + + + + Gets the type of the InnerReader's current node type. + + + + + Gets the prefix of the InnerReader's current node. + + + + + Gets the InnerReader's ReadState. + + + + + Gets the Value of the InnerReader's current node. + + + + + Gets the ValueType of InnerReader's current node. + + + + + Gets the InnerReader's XmlLang. + + + + + Gets the InnerReader's XmlSpace. + + + + + Gets the value of the InnerReader's attribute at the given index. + + The index of the attribute. The index is 0 based index. + The value of the attribute at the specified index. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name. + + The qualified name of the attribute. + The value of the attribute. If the attribute is not found null + is returned. + The method does not move the reader position. + + + + Gets the value of the InnerReader's attribute with the given name and namespace Uri. + + The local name of the attribute. + The namespace of the attribute. + The value of the attribute. If the attribute is not found + null is returned. + The method does not move the reader. + + + + Gets a value indicating if the InnerReader HasLineInfo + + + + + Resolves the InnerReader's namespace prefix in the current element scope. + + Prefix whose namespace Uri to be resolved. + The namespace Uri to which the prefix matches or null if no matching + prefix is found. + + + + Moves to the InnerReader's attribute with the specified index. + + The index of the attribute. + + + + Moves to the InnerReader's attribute with the given local name. + + The qualified name of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves to the InnerReader's attribute with the specified LocalName and NamespaceURI. + + The local name of the attribute. + The namespace URI of the attribute. + true if the attribute is found; otherwise, false. + + + + Moves the InnerReader to a node of type Element. + + true if the reader is positioned on an element else false + + + + Moves the InnerReader to the first attribute. + + Returns true if the reader is positioned at a attribute else false. + When returning false the reader position will not be changed. + + + + Moves the InnerReader to the next attribute. + + Returns true if the reader is positioned at an attribute else false. + When returning false the reader position will not be changed. + + + + Reads the InnerReader's next node from the stream. + + true if the next node was read successfully. + + + + Parses the InnerReader's attribute value into one or more Text, EntityReference, or EndEntity nodes. + + true if there are nodes to return.false if the reader is not positioned on + an attribute node when the initial call is made or if all the attribute values + have been read. + + + + Reads the InnerReader's content and returns the Base64 decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Reads the InnerReader's content and returns the BinHex decoded binary bytes. + + The buffer into which to copy the resulting text. This value cannot be null. + The offset into the buffer where to start copying the result. + The maximum number of bytes to copy into the buffer. + The number of bytes written to the buffer. + + + + Resolves the InnerReader's EntityReference nodes. + + + + + Reads large streams of text embedded in an XML document from the InnerReader. + + The array of characters that serves as the buffer to which the text contents + are written. This value cannot be null. + The offset within the buffer where the System.Xml.XmlReader can start to + copy the results. + The maximum number of characters to copy into the buffer. The actual number + of characters copied is returned from this method. + The number of characters read into the buffer. The value zero is returned + when there is no more text content. + + + + Gets the + + if is null. + + + + Wraps a and delegates to InnerWriter. + + + + + Initializes a new instance of + + + + + Gets or sets a for tracing. + + if 'value' is null. + + + + Gets or sets the InnerWriter. + + if 'value' is null. + + + + Flushes the underlying stream. + + + + + Encodes the specified binary bytes as Base64 and writes out the resulting text. + + Byte array to encode. + The position in the buffer indicating the start of the bytes to write. + The number of bytes to write. + + + + Writes out a CDATA block containing the specified text. + + The text to place inside the CDATA block. + + + + Forces the generation of a character entity for the specified Unicode character value. + + The Unicode character for which to generate a character entity. + + + + When overridden in a derived class, writes text one buffer at a time. + + Character array containing the text to write. + The position in the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes out a comment containing the specified text. + + Text to place inside the comment. + + + + Writes the DOCTYPE declaration with the specified name and optional attributes. + + The name of the DOCTYPE. This must be non-empty. + If non-null it also writes PUBLIC "pubid" "sysid" where pubid and sysid are + replaced with the value of the given arguments. + If pubid is null and sysid is non-null it writes SYSTEM "sysid" where sysid + is replaced with the value of this argument. + If non-null it writes [subset] where subset is replaced with the value of + this argument. + + + + Closes the previous System.Xml.XmlWriter.WriteStartAttribute(System.String,System.String) call. + + + + + Closes any open elements or attributes and puts the writer back in the Start state. + + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out an entity reference as name. + + The name of the entity reference. + + + + Closes one element and pops the corresponding namespace scope. + + + + + Writes out a processing instruction with a space between the name and text as follows: <?name text?>. + + The name of the processing instruction. + The text to include in the processing instruction. + + + + When overridden in a derived class, writes raw markup manually from a character buffer. + + Character array containing the text to write. + The position within the buffer indicating the start of the text to write. + The number of characters to write. + + + + Writes raw markup manually from a string. + + String containing the text to write. + + + + Writes the start of an attribute with the specified local name and namespace URI. + + The namespace prefix of the attribute. + The local name of the attribute. + The namespace URI for the attribute. + + + + When overridden in a derived class, writes the XML declaration with the version "1.0". + + + + + When overridden in a derived class, writes the XML declaration with the version + "1.0" and the standalone attribute. + + If true, it writes "standalone=yes"; if false, it writes "standalone=no". + + + + When overridden in a derived class, writes the specified start tag and associates + it with the given namespace and prefix. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + When overridden in a derived class, gets the state of the writer. + + + + + Writes the given text content. + + The text to write. + + + + Generates and writes the surrogate character entity for the surrogate character pair. + + The low surrogate. This must be a value between 0xDC00 and 0xDFFF. + The high surrogate. This must be a value between 0xD800 and 0xDBFF. + + + + Writes out the given white space. + + The string of white space characters. + + + + Writes an attribute as a xml attribute with the prefix 'xml:'. + + Localname of the attribute. + Attribute value. + + + + Writes an xmlns namespace declaration. + + The prefix of the namespace declaration. + The namespace Uri itself. + + + + Returns the closest prefix defined in the current namespace scope for the namespace URI. + + The namespace URI whose prefix to find. + The matching prefix or null if no matching namespace URI is found in the + current scope. + + + + Gets the + + if is null. + + + + Base class for a XmlDsig element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/ + + + + + Initializes a instance. + + + + + Gets or sets the Id. + + + + + Gets or sets the prefix associated with the element. + + + + + Reads and writes XML associated with XML DSig https://www.w3.org/TR/2001/PR-xmldsig-core-20010820 + + + + + Returns the default instance. + + + + + Static constructor that initializes the default . + + + + + Initializes an instance of + + + + + Gets or sets the prefix to use when writing the Signature element. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + pointing positioned on a <KeyInfo> element. + if is null. + if there is a problem reading the XML. + Only handles IssuerSerial, Ski, SubjectName, Certificate. Unsupported types are skipped. Only a X509 data element is supported. + + + + Reads the "X509DataElement" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "X509IssuerSerial" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data. + + A positioned on a element. + + + + Reads the "RSAKeyValue" element conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-RSAKeyValue. + + A positioned on a element. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + a positioned on a <Signature> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + a positioned on a <SignedInfo> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + a positioned on a <Reference> element. + if is null. + if there is a problem reading the XML. + + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Transforms + + a positioned on a <Transforms> element. + a to attach transforms. + if is null. + if is null. + if there is a problem reading the XML. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignatureMethod + + a positioned on a <SignatureMethod> element. + if is null. + if there is a problem reading the XML. + A string with the signature method. + + + + Reads XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-CanonicalizationMethod + + a positioned on a <CanonicalizationMethod> element. + if is null. + if there is a problem reading the XML. + A string with the canonicalization method. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo. + + the to use. + the to write. + if is null. + if is null. + if there is a problem writing the XML. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference. + + the to use. + the to write. + Assumes the <DigestValue> has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null or empty. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature. + + the to use. + the to write. + Assumes the <SignatureValue> has been calculated, no canonicalization or signature calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if one of the values in is null or empty. + + + + Writes the contents of a as XML conforming to https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo. + + the to use. + the to write. + Assumes the <Reference> digest has been calculated, no canonicalization or digest calculation is performed. + if is null. + if is null. + if is null or empty. + if is null. + if .Count > 1. + if is null or empty. + + + + Gets or sets the to use when processing transforms in References + + + + + Wraps a pointing to a root element of XML that may contain a signature. + If a Signature element is found, a will be populated and will + have set for future validation. + + + + + Initializes an instance of + + a pointing to XML that may contain an enveloped signature. + If a <Signature> element is found, the will be set. + if is null. + + + + Gets or sets the to use when reading XmlDSig elements. + + if 'value' is null. + + + + Called after the root element has been completely read. + Attaches a to the first Reference for future processing if + a signature was found. + + + + + Keeps track of the XML Element count. If a signature is detected it is read. + + 'true' if the next node was read successfully; 'false' if there are no more nodes. + if more than one signature is found. + if a <Reference> element was not found in the <SignedInfo>. + + + + Gets the that was found inside the XML. + + may be null. + + + + Defines a XML transform that removes the XML nodes associated with the Signature. + + + + + Creates an EnvelopedSignatureTransform + + + + + Gets the Algorithm associated with this transform + + + + + Sets the reader to exclude the <Signature> element + + to process. + with exclusion set. + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Represents an exception thrown when processing xml. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs reading XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + This exception is thrown when a problem occurs when validating the XML <Signature>. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class with a specified error message + and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The that is the cause of the current exception, or a null reference if no inner exception is specified. + + + + This exception is thrown when a problem occurs writing XML. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + + + + Initializes a new instance of the class. + + Addtional information to be included in the exception and displayed to user. + A that represents the root cause of the exception. + + + + Represents Canonicalization algorithms found in <SignedInfo> and in <Reference>. + + + + + Initializes an instance of . + + + + + Initializes an instance of . + + controls if the transform will include comments. + + + + Gets the Algorithm associated with this transform + + + + + Applies a canonicalization transform over a set of XML nodes and computes the hash value. + + the set of XML nodes to transform. + the hash algorithm to apply. + the hash of the transformed octets. + + + + Represents the IssuerSerial property of X509Data as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + + + + Gets the IssuerName of the IssuerSerial. + + + + + Gets the SerialNumber of the IssuerSerial. + + + + + Creates an IssuerSerial using the specified IssuerName and SerialNumber. + + + + + Compares two IssuerSerial objects. + + + + + Serves as a hash function for IssuerSerial. + + + + + Represents a XmlDsig KeyInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-KeyInfo + + Only a single 'X509Certificate' is supported. Multiples that include intermediate and root certs are not supported. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + the to populate the X509Data. + + + + Initializes an instance of . + + the to populate the . + + + + Gets or sets the 'KeyName' that can be used as a key identifier. + + + + + Gets or sets the Uri associated with the RetrievalMethod + + + + + Gets or sets the RSAKeyValue. + + + + + Gets the 'X509Data' value. + + + + + Compares two KeyInfo objects. + + + + + Serves as a hash function for KeyInfo. + + + + + Returns true if the KeyInfo object can be matched with the specified SecurityKey, returns false otherwise. + + + + + Log messages and codes for XmlProcessing + + + + + Represents a XmlDsig Reference element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Reference + + + + + Initializes an instance of + + + + + Initializes an instance of + + the to apply. + the to use. + if is null. + if is null. + + + + Gets or sets the CanonicalizingTransform + + if 'value' is null. + + + + Gets or sets the DigestMethod to use when creating the hash. + + if 'value' is null or empty. + + + + Gets or sets the Base64 encoding of the hashed octets. + + if 'value' is null or empty. + + + + Gets or sets the that is associated with the . + + if 'value' is null. + + + + Gets the of transforms to apply. + + + + + Gets or sets the Type of this Reference. + + + + + Gets or sets the Uri of this Reference. + + + + + Verifies that the equals the hashed value of the after + have been applied. + + supplies the . + if is null. + + + + Writes into a stream and then hashes the bytes. + + the set of XML nodes to read. + the hash algorithm to apply. + hash of the octets. + + + + Computes the digest of this reference by applying the transforms over the tokenStream. + + the that will supply the . + The digest over the after all transforms have been applied. + if is null. + if is null. + if is not supported. + if .CreateHashAlgorithm returns null. + + + + The RSAKeyValue found inside of the KeyValue element. + + + + + The modulus of the RSAKeyValue. + + + + + The exponent of the RSAKeyValue. + + + + + Creates an RSAKeyValue using the specified modulus and exponent. + + + + + Compares two RSAKeyValue objects. + + + + + Serves as a hash function for RSAKeyValue. + + + + + Represents a XmlDsig Signature element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-Signature + + + + + Initializes a instance. + + + + + Initializes a instance. + + associated with this Signature. + if if null. + + + + Gets or sets the KeyInfo + + + + + Gets or sets the SignatureValue + + if 'value' is null or empty. + + + + Gets or sets the . + + if 'value' is null. + + + + Verifies the signature over the SignedInfo. + + the to use for cryptographic operations. + the to obtain cryptographic operators. + if is null. + if is null. + if null. + if is not supported. + if signature does not validate. + + + + Represents a XmlDsig SignedInfo element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-SignedInfo + + + + + Initializes a instance. + + + + + Initializes a instance. + + a to include. + if is null. + + + + Gets or sets the CanonicalizationMethod + + if 'value' is null. + if 'value' is not one of: + "http://www.w3.org/2001/10/xml-exc-c14n#" + "http://www.w3.org/2001/10/xml-exc-c14n#WithComments" + + + + + Gets or sets the Reference. + + if 'value' is null. + + + + Gets or sets the SignatureMethod. + + if 'value' is null. + + + + Verifies the digest of all . + + supplies any required cryptographic operators. + if is null. + + + + Writes the Canonicalized bytes into a stream. + + the to receive the bytes. + + + + Defines a XMLTransform + + + + + Called to transform a + + the to process. + + + + + Gets the algorithm + + + + + + + + + Static constructor that initializes the default . + + + + + Gets the default instance of + + + + + Determine if the transform is supported. + + the name of the transform. + if the transform is supported + + + + Determine if the canonicalizing transform is supported. + + the name of the canonicalizing transform. + if the canonicalizing transform is supported + + + + Gets a XML transform that modifies a XmlTokenStream. + + the name of the transform. + + + + + Gets a XML transform that is capable of Canonicalizing XML and returning bytes. + + the name of the transform. + + + + + Represents a XmlDsig X509Data element as per: https://www.w3.org/TR/2001/PR-xmldsig-core-20010820/#sec-X509Data + + Supports multiple certificates. + + + + Initializes an instance of . + + + + + Initializes an instance of . + + If 'certificate' is null + + + + Initializes an instance of . + + If 'certificates' is null + + + + Gets or sets the 'X509IssuerSerial' that is part of a 'X509Data'. + + + + + Gets or sets the 'X509SKI' value that is a part of 'X509Data'. + + + + + Get or sets the 'X509SubjectName' value that is a part of 'X509Data'. + + + + + Get the collection of X509Certificates that is associated with 'X509Data'. + + + + + Get or sets the 'CRL' value that is a part of 'X509Data'. + + + + + Compares two X509Data objects. + + + + + Serves as a hash function for X509Data. + + + + + Constants for XML Signature + Definitions for namespace, attributes and elements as defined in http://www.w3.org/TR/xmldsig-core/ + + + + + Maintains a collection of XML nodes obtained when reading signed XML. + + + + + Initializes a + + + + + Adds a XML node to the collection. + + + + if is null. + + + + Adds a XML attribute node to the collection + + the XML prefix. + the local name of the attribute. + the namespace of the attribute. + the value of the attribute. + if is null or empty. + + + + Adds a XML element node to the collection + + the XML prefix. + the local name of the element. + the namespace of the attribute. + value indicating if the element is empty. + if is null or empty. + + + + Sets the name and namespace of which element to exclude. Normally this is the <Signature> element. + + the name of the Element to exclude. + the namespace of the Element to exclude. + if is null or empty. + + + + Writes the XML nodes into the . + + the to use. + if is null. + + + + An XmlReader that captures xml as a XmlTokenStream + + + + + Initializes a new instance of for creating a . + + an to capture the . + if if null. + if .IsStartElement() is false. + + + + Gets the + + + + + Delegates to InnerReader, then calls Record() + + + + + Utilities for working with XML + + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at at expected element. + + + + Checks if the is pointing to an expected element. + + the to check. + the expected element. + the expected namespace. + if is null. + if is null or empty. + if if not at a StartElement. + if if not at expected element. + + + + Determine if reader is at expected element in one of the listed namespace in namespaceList. + + the to check. + the expected element. + the expected namespace list. + if is at expected element. + if is null. + if is null or empty. + + + + Determines if a Qualified names equals a name / namespace pair. + + the to compare. + the name to compare. + the namepace to compare. + + + + + + + + Hex representation of bytes + + + + Gets the xsi:type as a for the current element. + + an pointing at an Element. + if is null. + a if the current element has an XSI type. + If is not on an element OR xsi type is not found, null. + + + + Determines if the has an attribute that is 'nil' + + a positioned on an element. + if is null. + true is the attribute value is 'nil' + + + + Normalizes an empty string to 'null'. + + + null if string is null or empty. + + + + Returns a new with message including the element and attribute. + + the missing element. + the missing attribute. + a . + + + + Determines if the prefix on a name maps to a namespace that is in scope the reader. + + the in scope. + the qualifiedName to check. + if is null. + if is null. + a with the namespace that was in scope. If the prefix was not in scope, the namespace will be null. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + if is null. + if is null. + if is null. + if the does require an xsi:type attribute to be present. If the xsi:type is present, it will be validated. + + + + Validates that element the is positioned on has an xsi:type attribute + with a specific name and type. + + an positioned on an element. + the expected name of the xsi:type. + the expected namespace of the xsi:type. + controls if the xsi:type must be present. + if is null. + if is null. + if is null. + if xsi:type is not found and required. + if xsi:type is found and did not match expected. + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + a . + + + + Sends formatted to the Logger. + + the format string. + the arguments to use for formating. + the inner exception. + a . + + + diff --git a/packages/Newtonsoft.Json.10.0.1/.signature.p7s b/packages/Newtonsoft.Json.10.0.1/.signature.p7s new file mode 100644 index 0000000..28bd113 Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/.signature.p7s differ diff --git a/packages/Newtonsoft.Json.10.0.1/Newtonsoft.Json.10.0.1.nupkg b/packages/Newtonsoft.Json.10.0.1/Newtonsoft.Json.10.0.1.nupkg new file mode 100644 index 0000000..d81ac63 Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/Newtonsoft.Json.10.0.1.nupkg differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.dll new file mode 100644 index 0000000..8524e8b Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.xml new file mode 100644 index 0000000..3055674 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/net20/Newtonsoft.Json.xml @@ -0,0 +1,9807 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Represents a view of a . + + + + + Initializes a new instance of the class. + + The name. + + + + When overridden in a derived class, returns whether resetting an object changes its value. + + + true if resetting the component changes its value; otherwise, false. + + The component to test for reset capability. + + + + When overridden in a derived class, gets the current value of the property on a component. + + + The value of a property for a given component. + + The component with the property for which to retrieve the value. + + + + When overridden in a derived class, resets the value for this property of the component to the default value. + + The component with the property value that is to be reset to the default value. + + + + When overridden in a derived class, sets the value of the component to a different value. + + The component with the property value that is to be set. + The new value. + + + + When overridden in a derived class, determines a value indicating whether the value of this property needs to be persisted. + + + true if the property should be persisted; otherwise, false. + + The component with the property to be examined for persistence. + + + + When overridden in a derived class, gets the type of the component this property is bound to. + + + A that represents the type of component this property is bound to. + When the or + + methods are invoked, the object specified might be an instance of this type. + + + + + When overridden in a derived class, gets a value indicating whether this property is read-only. + + + true if the property is read-only; otherwise, false. + + + + + When overridden in a derived class, gets the type of the property. + + + A that represents the type of the property. + + + + + Gets the hash code for the name of the member. + + + + The hash code for the name of the member. + + + + + Represents a raw JSON string. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a JSON constructor. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the list changes or an item in the list changes. + + + + + Occurs before an item is added to the collection. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Represents a JSON array. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents an abstract JSON token. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Represents a JSON property. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a trace writer that writes to the application's instances. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets the default members search flags. + + The default members search flags. + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Provides a set of static (Shared in Visual Basic) methods for + querying objects that implement . + + + + + Returns the input typed as . + + + + + Returns an empty that has the + specified type argument. + + + + + Converts the elements of an to the + specified type. + + + + + Filters the elements of an based on a specified type. + + + + + Generates a sequence of integral numbers within a specified range. + + The value of the first integer in the sequence. + The number of sequential integers to generate. + + + + Generates a sequence that contains one repeated value. + + + + + Filters a sequence of values based on a predicate. + + + + + Filters a sequence of values based on a predicate. + Each element's index is used in the logic of the predicate function. + + + + + Projects each element of a sequence into a new form. + + + + + Projects each element of a sequence into a new form by + incorporating the element's index. + + + + + Projects each element of a sequence to an + and flattens the resulting sequences into one sequence. + + + + + Projects each element of a sequence to an , + and flattens the resulting sequences into one sequence. The + index of each source element is used in the projected form of + that element. + + + + + Projects each element of a sequence to an , + flattens the resulting sequences into one sequence, and invokes + a result selector function on each element therein. + + + + + Projects each element of a sequence to an , + flattens the resulting sequences into one sequence, and invokes + a result selector function on each element therein. The index of + each source element is used in the intermediate projected form + of that element. + + + + + Returns elements from a sequence as long as a specified condition is true. + + + + + Returns elements from a sequence as long as a specified condition is true. + The element's index is used in the logic of the predicate function. + + + + + Base implementation of First operator. + + + + + Returns the first element of a sequence. + + + + + Returns the first element in a sequence that satisfies a specified condition. + + + + + Returns the first element of a sequence, or a default value if + the sequence contains no elements. + + + + + Returns the first element of the sequence that satisfies a + condition or a default value if no such element is found. + + + + + Base implementation of Last operator. + + + + + Returns the last element of a sequence. + + + + + Returns the last element of a sequence that satisfies a + specified condition. + + + + + Returns the last element of a sequence, or a default value if + the sequence contains no elements. + + + + + Returns the last element of a sequence that satisfies a + condition or a default value if no such element is found. + + + + + Base implementation of Single operator. + + + + + Returns the only element of a sequence, and throws an exception + if there is not exactly one element in the sequence. + + + + + Returns the only element of a sequence that satisfies a + specified condition, and throws an exception if more than one + such element exists. + + + + + Returns the only element of a sequence, or a default value if + the sequence is empty; this method throws an exception if there + is more than one element in the sequence. + + + + + Returns the only element of a sequence that satisfies a + specified condition or a default value if no such element + exists; this method throws an exception if more than one element + satisfies the condition. + + + + + Returns the element at a specified index in a sequence. + + + + + Returns the element at a specified index in a sequence or a + default value if the index is out of range. + + + + + Inverts the order of the elements in a sequence. + + + + + Returns a specified number of contiguous elements from the start + of a sequence. + + + + + Bypasses a specified number of elements in a sequence and then + returns the remaining elements. + + + + + Bypasses elements in a sequence as long as a specified condition + is true and then returns the remaining elements. + + + + + Bypasses elements in a sequence as long as a specified condition + is true and then returns the remaining elements. The element's + index is used in the logic of the predicate function. + + + + + Returns the number of elements in a sequence. + + + + + Returns a number that represents how many elements in the + specified sequence satisfy a condition. + + + + + Returns a that represents the total number + of elements in a sequence. + + + + + Returns a that represents how many elements + in a sequence satisfy a condition. + + + + + Concatenates two sequences. + + + + + Creates a from an . + + + + + Creates an array from an . + + + + + Returns distinct elements from a sequence by using the default + equality comparer to compare values. + + + + + Returns distinct elements from a sequence by using a specified + to compare values. + + + + + Creates a from an + according to a specified key + selector function. + + + + + Creates a from an + according to a specified key + selector function and a key comparer. + + + + + Creates a from an + according to specified key + and element selector functions. + + + + + Creates a from an + according to a specified key + selector function, a comparer and an element selector function. + + + + + Groups the elements of a sequence according to a specified key + selector function. + + + + + Groups the elements of a sequence according to a specified key + selector function and compares the keys by using a specified + comparer. + + + + + Groups the elements of a sequence according to a specified key + selector function and projects the elements for each group by + using a specified function. + + + + + Groups the elements of a sequence according to a specified key + selector function and creates a result value from each group and + its key. + + + + + Groups the elements of a sequence according to a key selector + function. The keys are compared by using a comparer and each + group's elements are projected by using a specified function. + + + + + Groups the elements of a sequence according to a specified key + selector function and creates a result value from each group and + its key. The elements of each group are projected by using a + specified function. + + + + + Groups the elements of a sequence according to a specified key + selector function and creates a result value from each group and + its key. The keys are compared by using a specified comparer. + + + + + Groups the elements of a sequence according to a specified key + selector function and creates a result value from each group and + its key. Key values are compared by using a specified comparer, + and the elements of each group are projected by using a + specified function. + + + + + Applies an accumulator function over a sequence. + + + + + Applies an accumulator function over a sequence. The specified + seed value is used as the initial accumulator value. + + + + + Applies an accumulator function over a sequence. The specified + seed value is used as the initial accumulator value, and the + specified function is used to select the result value. + + + + + Produces the set union of two sequences by using the default + equality comparer. + + + + + Produces the set union of two sequences by using a specified + . + + + + + Returns the elements of the specified sequence or the type + parameter's default value in a singleton collection if the + sequence is empty. + + + + + Returns the elements of the specified sequence or the specified + value in a singleton collection if the sequence is empty. + + + + + Determines whether all elements of a sequence satisfy a condition. + + + + + Determines whether a sequence contains any elements. + + + + + Determines whether any element of a sequence satisfies a + condition. + + + + + Determines whether a sequence contains a specified element by + using the default equality comparer. + + + + + Determines whether a sequence contains a specified element by + using a specified . + + + + + Determines whether two sequences are equal by comparing the + elements by using the default equality comparer for their type. + + + + + Determines whether two sequences are equal by comparing their + elements by using a specified . + + + + + Base implementation for Min/Max operator. + + + + + Base implementation for Min/Max operator for nullable types. + + + + + Returns the minimum value in a generic sequence. + + + + + Invokes a transform function on each element of a generic + sequence and returns the minimum resulting value. + + + + + Returns the maximum value in a generic sequence. + + + + + Invokes a transform function on each element of a generic + sequence and returns the maximum resulting value. + + + + + Makes an enumerator seen as enumerable once more. + + + The supplied enumerator must have been started. The first element + returned is the element the enumerator was on when passed in. + DO NOT use this method if the caller must be a generator. It is + mostly safe among aggregate operations. + + + + + Sorts the elements of a sequence in ascending order according to a key. + + + + + Sorts the elements of a sequence in ascending order by using a + specified comparer. + + + + + Sorts the elements of a sequence in descending order according to a key. + + + + + Sorts the elements of a sequence in descending order by using a + specified comparer. + + + + + Performs a subsequent ordering of the elements in a sequence in + ascending order according to a key. + + + + + Performs a subsequent ordering of the elements in a sequence in + ascending order by using a specified comparer. + + + + + Performs a subsequent ordering of the elements in a sequence in + descending order, according to a key. + + + + + Performs a subsequent ordering of the elements in a sequence in + descending order by using a specified comparer. + + + + + Base implementation for Intersect and Except operators. + + + + + Produces the set intersection of two sequences by using the + default equality comparer to compare values. + + + + + Produces the set intersection of two sequences by using the + specified to compare values. + + + + + Produces the set difference of two sequences by using the + default equality comparer to compare values. + + + + + Produces the set difference of two sequences by using the + specified to compare values. + + + + + Creates a from an + according to a specified key + selector function. + + + + + Creates a from an + according to a specified key + selector function and key comparer. + + + + + Creates a from an + according to specified key + selector and element selector functions. + + + + + Creates a from an + according to a specified key + selector function, a comparer, and an element selector function. + + + + + Correlates the elements of two sequences based on matching keys. + The default equality comparer is used to compare keys. + + + + + Correlates the elements of two sequences based on matching keys. + The default equality comparer is used to compare keys. A + specified is used to compare keys. + + + + + Correlates the elements of two sequences based on equality of + keys and groups the results. The default equality comparer is + used to compare keys. + + + + + Correlates the elements of two sequences based on equality of + keys and groups the results. The default equality comparer is + used to compare keys. A specified + is used to compare keys. + + + + + Computes the sum of a sequence of values. + + + + + Computes the sum of a sequence of + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of values. + + + + + Computes the average of a sequence of values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of nullable + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of nullable values. + + + + + Computes the average of a sequence of nullable values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Returns the minimum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the minimum nullable value. + + + + + Returns the maximum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the maximum nullable value. + + + + + Computes the sum of a sequence of values. + + + + + Computes the sum of a sequence of + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of values. + + + + + Computes the average of a sequence of values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of nullable + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of nullable values. + + + + + Computes the average of a sequence of nullable values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Returns the minimum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the minimum nullable value. + + + + + Returns the maximum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the maximum nullable value. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of values. + + + + + Computes the average of a sequence of values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of nullable + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of nullable values. + + + + + Computes the average of a sequence of nullable values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Returns the minimum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the minimum nullable value. + + + + + Returns the maximum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the maximum nullable value. + + + + + Computes the sum of a sequence of values. + + + + + Computes the sum of a sequence of + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of values. + + + + + Computes the average of a sequence of values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of nullable + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of nullable values. + + + + + Computes the average of a sequence of nullable values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Returns the minimum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the minimum nullable value. + + + + + Returns the maximum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the maximum nullable value. + + + + + Computes the sum of a sequence of values. + + + + + Computes the sum of a sequence of + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of values. + + + + + Computes the average of a sequence of values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Computes the sum of a sequence of nullable values. + + + + + Computes the sum of a sequence of nullable + values that are obtained by invoking a transform function on + each element of the input sequence. + + + + + Computes the average of a sequence of nullable values. + + + + + Computes the average of a sequence of nullable values + that are obtained by invoking a transform function on each + element of the input sequence. + + + + + Returns the minimum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the minimum nullable value. + + + + + Returns the maximum value in a sequence of nullable + values. + + + + + Invokes a transform function on each element of a sequence and + returns the maximum nullable value. + + + + + Represents a collection of objects that have a common key. + + + + + Gets the key of the . + + + + + Defines an indexer, size property, and Boolean search method for + data structures that map keys to + sequences of values. + + + + + Represents a sorted sequence. + + + + + Performs a subsequent ordering on the elements of an + according to a key. + + + + + Represents a collection of keys each mapped to one or more values. + + + + + Gets the number of key/value collection pairs in the . + + + + + Gets the collection of values indexed by the specified key. + + + + + Determines whether a specified key is in the . + + + + + Applies a transform function to each key and its associated + values and returns the results. + + + + + Returns a generic enumerator that iterates through the . + + + + + See issue #11 + for why this method is needed and cannot be expressed as a + lambda at the call site. + + + + + See issue #11 + for why this method is needed and cannot be expressed as a + lambda at the call site. + + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Represents a collection of . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + + This attribute allows us to define extension methods without + requiring .NET Framework 3.5. For more information, see the section, + Extension Methods in .NET Framework 2.0 Apps, + of Basic Instincts: Extension Methods + column in MSDN Magazine, + issue Nov 2007. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.dll new file mode 100644 index 0000000..2d3d929 Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.xml new file mode 100644 index 0000000..6d00db7 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/net35/Newtonsoft.Json.xml @@ -0,0 +1,8936 @@ + + + + Newtonsoft.Json + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an Entity Framework to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Represents a view of a . + + + + + Initializes a new instance of the class. + + The name. + + + + When overridden in a derived class, returns whether resetting an object changes its value. + + + true if resetting the component changes its value; otherwise, false. + + The component to test for reset capability. + + + + When overridden in a derived class, gets the current value of the property on a component. + + + The value of a property for a given component. + + The component with the property for which to retrieve the value. + + + + When overridden in a derived class, resets the value for this property of the component to the default value. + + The component with the property value that is to be reset to the default value. + + + + When overridden in a derived class, sets the value of the component to a different value. + + The component with the property value that is to be set. + The new value. + + + + When overridden in a derived class, determines a value indicating whether the value of this property needs to be persisted. + + + true if the property should be persisted; otherwise, false. + + The component with the property to be examined for persistence. + + + + When overridden in a derived class, gets the type of the component this property is bound to. + + + A that represents the type of component this property is bound to. + When the or + + methods are invoked, the object specified might be an instance of this type. + + + + + When overridden in a derived class, gets a value indicating whether this property is read-only. + + + true if the property is read-only; otherwise, false. + + + + + When overridden in a derived class, gets the type of the property. + + + A that represents the type of the property. + + + + + Gets the hash code for the name of the member. + + + + The hash code for the name of the member. + + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Represents a raw JSON string. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a JSON constructor. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the list changes or an item in the list changes. + + + + + Occurs before an item is added to the collection. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Occurs when a property value is changing. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Represents a JSON array. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents an abstract JSON token. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Represents a JSON property. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a trace writer that writes to the application's instances. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets the default members search flags. + + The default members search flags. + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Represents a method that constructs an object. + + The object type to create. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Represents a collection of . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.dll new file mode 100644 index 0000000..71ae7e6 Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.xml new file mode 100644 index 0000000..15c7548 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/net40/Newtonsoft.Json.xml @@ -0,0 +1,9136 @@ + + + + Newtonsoft.Json + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an Entity Framework to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Represents a raw JSON string. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Represents a view of a . + + + + + Initializes a new instance of the class. + + The name. + + + + When overridden in a derived class, returns whether resetting an object changes its value. + + + true if resetting the component changes its value; otherwise, false. + + The component to test for reset capability. + + + + When overridden in a derived class, gets the current value of the property on a component. + + + The value of a property for a given component. + + The component with the property for which to retrieve the value. + + + + When overridden in a derived class, resets the value for this property of the component to the default value. + + The component with the property value that is to be reset to the default value. + + + + When overridden in a derived class, sets the value of the component to a different value. + + The component with the property value that is to be set. + The new value. + + + + When overridden in a derived class, determines a value indicating whether the value of this property needs to be persisted. + + + true if the property should be persisted; otherwise, false. + + The component with the property to be examined for persistence. + + + + When overridden in a derived class, gets the type of the component this property is bound to. + + + A that represents the type of component this property is bound to. + When the or + + methods are invoked, the object specified might be an instance of this type. + + + + + When overridden in a derived class, gets a value indicating whether this property is read-only. + + + true if the property is read-only; otherwise, false. + + + + + When overridden in a derived class, gets the type of the property. + + + A that represents the type of the property. + + + + + Gets the hash code for the name of the member. + + + + The hash code for the name of the member. + + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a JSON constructor. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the list changes or an item in the list changes. + + + + + Occurs before an item is added to the collection. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Occurs when a property value is changing. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Represents a JSON array. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents an abstract JSON token. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Represents a JSON property. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a trace writer that writes to the application's instances. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets the default members search flags. + + The default members search flags. + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Represents a method that constructs an object. + + The object type to create. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Represents a collection of . + + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.dll new file mode 100644 index 0000000..bc3ef13 Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.xml new file mode 100644 index 0000000..157e1f7 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/net45/Newtonsoft.Json.xml @@ -0,0 +1,10752 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an Entity Framework to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Represents a collection of . + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously skips the children of the current token. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously ets the state of the . + + The being written. + The value being written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Represents a JSON array. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a JSON constructor. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the list changes or an item in the list changes. + + + + + Occurs before an item is added to the collection. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Occurs when a property value is changing. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Represents a JSON property. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a raw JSON string. + + + + + Asynchronously creates an instance of with the content of the reader's current token. + + The reader. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns an instance of with the content of the reader's current token. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Represents a view of a . + + + + + Initializes a new instance of the class. + + The name. + + + + When overridden in a derived class, returns whether resetting an object changes its value. + + + true if resetting the component changes its value; otherwise, false. + + The component to test for reset capability. + + + + When overridden in a derived class, gets the current value of the property on a component. + + + The value of a property for a given component. + + The component with the property for which to retrieve the value. + + + + When overridden in a derived class, resets the value for this property of the component to the default value. + + The component with the property value that is to be reset to the default value. + + + + When overridden in a derived class, sets the value of the component to a different value. + + The component with the property value that is to be set. + The new value. + + + + When overridden in a derived class, determines a value indicating whether the value of this property needs to be persisted. + + + true if the property should be persisted; otherwise, false. + + The component with the property to be examined for persistence. + + + + When overridden in a derived class, gets the type of the component this property is bound to. + + + A that represents the type of component this property is bound to. + When the or + + methods are invoked, the object specified might be an instance of this type. + + + + + When overridden in a derived class, gets a value indicating whether this property is read-only. + + + true if the property is read-only; otherwise, false. + + + + + When overridden in a derived class, gets the type of the property. + + + A that represents the type of the property. + + + + + Gets the hash code for the name of the member. + + + + The hash code for the name of the member. + + + + + Represents an abstract JSON token. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Writes this token to a asynchronously. + + A into which this method will write. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets the default members search flags. + + The default members search flags. + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer that writes to the application's instances. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.dll new file mode 100644 index 0000000..8a6bb0a Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.xml new file mode 100644 index 0000000..51cb068 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.0/Newtonsoft.Json.xml @@ -0,0 +1,10504 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Represents a collection of . + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously skips the children of the current token. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously ets the state of the . + + The being written. + The value being written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Represents a JSON array. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a JSON constructor. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Represents a JSON property. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a raw JSON string. + + + + + Asynchronously creates an instance of with the content of the reader's current token. + + The reader. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns an instance of with the content of the reader's current token. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Represents an abstract JSON token. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Writes this token to a asynchronously. + + A into which this method will write. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Allows users to control class loading and mandate what class to load. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Specifies what messages to output for the class. + + + + + Output no tracing and debugging messages. + + + + + Output error-handling messages. + + + + + Output warnings and error-handling messages. + + + + + Output informational messages, warnings, and error-handling messages. + + + + + Output all debugging and tracing messages. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + List of primitive types which can be widened. + + + + + Widening masks for primitive types above. + Index of the value in this array defines a type we're widening, + while the bits in mask define types it can be widened to (including itself). + + For example, value at index 0 defines a bool type, and it only has bit 0 set, + i.e. bool values can be assigned only to bool. + + + + + Checks if value of primitive type can be + assigned to parameter of primitive type . + + Source primitive type. + Target primitive type. + true if source type can be widened to target type, false otherwise. + + + + Checks if a set of values with given can be used + to invoke a method with specified . + + Method parameters. + Argument types. + Try to pack extra arguments into the last parameter when it is marked up with . + true if method can be called with given arguments, false otherwise. + + + + Compares two sets of parameters to determine + which one suits better for given argument types. + + + + + Returns a best method overload for given argument . + + List of method candidates. + Argument types. + Best method overload, or null if none matched. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the method is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The is used to load the assembly. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.dll new file mode 100644 index 0000000..d6e3d9d Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.xml new file mode 100644 index 0000000..b4c0699 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/netstandard1.3/Newtonsoft.Json.xml @@ -0,0 +1,10596 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to serialize. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to serialize. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Represents a collection of . + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously skips the children of the current token. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously ets the state of the . + + The being written. + The value being written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Represents a JSON array. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Represents a JSON constructor. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Represents a JSON property. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Represents a raw JSON string. + + + + + Asynchronously creates an instance of with the content of the reader's current token. + + The reader. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns an instance of with the content of the reader's current token. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Represents an abstract JSON token. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Writes this token to a asynchronously. + + A into which this method will write. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Allows users to control class loading and mandate what class to load. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the interface when serializing and deserializing types. + + + true if the interface will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets a value indicating whether to ignore the attribute when serializing and deserializing types. + + + true if the attribute will be ignored when serializing and deserializing types; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object constructor. + + The object constructor. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Specifies what messages to output for the class. + + + + + Output no tracing and debugging messages. + + + + + Output error-handling messages. + + + + + Output warnings and error-handling messages. + + + + + Output informational messages, warnings, and error-handling messages. + + + + + Output all debugging and tracing messages. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + List of primitive types which can be widened. + + + + + Widening masks for primitive types above. + Index of the value in this array defines a type we're widening, + while the bits in mask define types it can be widened to (including itself). + + For example, value at index 0 defines a bool type, and it only has bit 0 set, + i.e. bool values can be assigned only to bool. + + + + + Checks if value of primitive type can be + assigned to parameter of primitive type . + + Source primitive type. + Target primitive type. + true if source type can be widened to target type, false otherwise. + + + + Checks if a set of values with given can be used + to invoke a method with specified . + + Method parameters. + Argument types. + Try to pack extra arguments into the last parameter when it is marked up with . + true if method can be called with given arguments, false otherwise. + + + + Compares two sets of parameters to determine + which one suits better for given argument types. + + + + + Returns a best method overload for given argument . + + List of method candidates. + Argument types. + Best method overload, or null if none matched. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the method is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The is used to load the assembly. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.dll b/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.dll new file mode 100644 index 0000000..149d48d Binary files /dev/null and b/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.dll differ diff --git a/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.xml b/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.xml new file mode 100644 index 0000000..4380230 --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/lib/portable-net45+win8+wpa81+wp8/Newtonsoft.Json.xml @@ -0,0 +1,10504 @@ + + + + Newtonsoft.Json + + + + + Represents a BSON Oid (object id). + + + + + Gets or sets the value of the Oid. + + The value of the Oid. + + + + Initializes a new instance of the class. + + The Oid value. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized BSON data. + + + + + Gets or sets a value indicating whether binary data reading should be compatible with incorrect Json.NET 3.5 written binary. + + + true if binary data reading will be compatible with incorrect Json.NET 3.5 written binary; otherwise, false. + + + + + Gets or sets a value indicating whether the root object will be read as a JSON array. + + + true if the root object will be read as a JSON array; otherwise, false. + + + + + Gets or sets the used when reading values from BSON. + + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Initializes a new instance of the class. + + The containing the BSON data to read. + if set to true the root object will be read as a JSON array. + The used when reading values from BSON. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating BSON data. + + + + + Gets or sets the used when writing values to BSON. + When set to no conversion will occur. + + The used when writing values to BSON. + + + + Initializes a new instance of the class. + + The to write to. + + + + Initializes a new instance of the class. + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying stream. + + + + + Writes the end. + + The token. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes the beginning of a JSON array. + + + + + Writes the beginning of a JSON object. + + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value that represents a BSON object id. + + The Object ID value to write. + + + + Writes a BSON regex. + + The regex pattern. + The regex options. + + + + Specifies how constructors are used when initializing objects during deserialization by the . + + + + + First attempt to use the public default constructor, then fall back to a single parameterized constructor, then to the non-public default constructor. + + + + + Json.NET will use a non-public default constructor before falling back to a parameterized constructor. + + + + + Converts a binary value to and from a base 64 string value. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Creates a custom object. + + The object type to convert. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Creates an object which will then be populated by the serializer. + + Type of the object. + The created object. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Provides a base class for converting a to and from JSON. + + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a F# discriminated union type to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can write JSON. + + + true if this can write JSON; otherwise, false. + + + + + Converts a to and from the ISO 8601 date format (e.g. "2008-04-12T12:53Z"). + + + + + Gets or sets the date time styles used when converting a date to and from JSON. + + The date time styles used when converting a date to and from JSON. + + + + Gets or sets the date time format used when converting a date to and from JSON. + + The date time format used when converting a date to and from JSON. + + + + Gets or sets the culture used when converting a date to and from JSON. + + The culture used when converting a date to and from JSON. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Converts a to and from a JavaScript Date constructor (e.g. new Date(52231943)). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Converts a to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from JSON and BSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts an to and from its name string value. + + + + + Gets or sets a value indicating whether the written enum text should be camel case. + + true if the written enum text will be camel case; otherwise, false. + + + + Gets or sets a value indicating whether integer values are allowed when deserializing. + + true if integers are allowed when deserializing; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class. + + true if the written enum text will be camel case; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts a to and from a string (e.g. "1.2.3.4"). + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing property value of the JSON that is being converted. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Converts XML to and from JSON. + + + + + Gets or sets the name of the root element to insert when deserializing to XML if the JSON structure has produced multiple root elements. + + The name of the deserialized root element. + + + + Gets or sets a flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + true if the array attribute is written to the XML; otherwise, false. + + + + Gets or sets a value indicating whether to write the root JSON object. + + true if the JSON root object is omitted; otherwise, false. + + + + Writes the JSON representation of the object. + + The to write to. + The calling serializer. + The value. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Checks if the is a namespace attribute. + + Attribute name to test. + The attribute name prefix if it has one, otherwise an empty string. + true if attribute name is for a namespace attribute, otherwise false. + + + + Determines whether this instance can convert the specified value type. + + Type of the value. + + true if this instance can convert the specified value type; otherwise, false. + + + + + Specifies how dates are formatted when writing JSON text. + + + + + Dates are written in the ISO 8601 format, e.g. "2012-03-21T05:40Z". + + + + + Dates are written in the Microsoft JSON format, e.g. "\/Date(1198908717056)\/". + + + + + Specifies how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON text. + + + + + Date formatted strings are not parsed to a date type and are read as strings. + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed to . + + + + + Specifies how to treat the time value when converting between string and . + + + + + Treat as local time. If the object represents a Coordinated Universal Time (UTC), it is converted to the local time. + + + + + Treat as a UTC. If the object represents a local time, it is converted to a UTC. + + + + + Treat as a local time if a is being converted to a string. + If a string is being converted to , convert to a local time if a time zone is specified. + + + + + Time zone information should be preserved when converting. + + + + + Specifies default value handling options for the . + + + + + + + + + Include members where the member value is the same as the member's default value when serializing objects. + Included members are written to JSON. Has no effect when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + so that it is not written to JSON. + This option will ignore all default values (e.g. null for objects and nullable types; 0 for integers, + decimals and floating point numbers; and false for booleans). The default value ignored can be changed by + placing the on the property. + + + + + Members with a default value but no JSON will be set to their default value when deserializing. + + + + + Ignore members where the member value is the same as the member's default value when serializing objects + and set members to their default value when deserializing. + + + + + Specifies float format handling options when writing special floating point numbers, e.g. , + and with . + + + + + Write special floating point values as strings in JSON, e.g. "NaN", "Infinity", "-Infinity". + + + + + Write special floating point values as symbols in JSON, e.g. NaN, Infinity, -Infinity. + Note that this will produce non-valid JSON. + + + + + Write special floating point values as the property's default value in JSON, e.g. 0.0 for a property, null for a of property. + + + + + Specifies how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Floating point numbers are parsed to . + + + + + Floating point numbers are parsed to . + + + + + Specifies formatting options for the . + + + + + No special formatting is applied. This is the default. + + + + + Causes child objects to be indented according to the and settings. + + + + + Provides an interface for using pooled arrays. + + The array type content. + + + + Rent an array from the pool. This array must be returned when it is no longer needed. + + The minimum required length of the array. The returned array may be longer. + The rented array from the pool. This array must be returned when it is no longer needed. + + + + Return an array to the pool. + + The array that is being returned. + + + + Provides an interface to enable a class to return line and position information. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + The current line number or 0 if no line information is available (for example, when returns false). + + + + Gets the current line position. + + The current line position or 0 if no line information is available (for example, when returns false). + + + + Instructs the how to serialize the collection. + + + + + Gets or sets a value indicating whether null items are allowed in the collection. + + true if null items are allowed in the collection; otherwise, false. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with a flag indicating whether the array can contain null items. + + A flag indicating whether the array can contain null items. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to use the specified constructor when deserializing that object. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the id. + + The id. + + + + Gets or sets the title. + + The title. + + + + Gets or sets the description. + + The description. + + + + Gets or sets the collection's items converter. + + The collection's items converter. + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonContainer(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets a value that indicates whether to preserve object references. + + + true to keep object reference; otherwise, false. The default is false. + + + + + Gets or sets a value that indicates whether to preserve collection's items references. + + + true to keep collection's items object references; otherwise, false. The default is false. + + + + + Gets or sets the reference loop handling used when serializing the collection's items. + + The reference loop handling. + + + + Gets or sets the type name handling used when serializing the collection's items. + + The type name handling. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Provides methods for converting between .NET types and JSON types. + + + + + + + + Gets or sets a function that creates default . + Default settings are automatically used by serialization methods on , + and and on . + To serialize without using any default settings create a with + . + + + + + Represents JavaScript's boolean value true as a string. This field is read-only. + + + + + Represents JavaScript's boolean value false as a string. This field is read-only. + + + + + Represents JavaScript's null as a string. This field is read-only. + + + + + Represents JavaScript's undefined as a string. This field is read-only. + + + + + Represents JavaScript's positive infinity as a string. This field is read-only. + + + + + Represents JavaScript's negative infinity as a string. This field is read-only. + + + + + Represents JavaScript's NaN as a string. This field is read-only. + + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + The time zone handling when the date is converted to a string. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation using the specified. + + The value to convert. + The format the date will be converted to. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + The string delimiter character. + The string escape handling. + A JSON string representation of the . + + + + Converts the to its JSON string representation. + + The value to convert. + A JSON string representation of the . + + + + Serializes the specified object to a JSON string. + + The object to serialize. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting. + + The object to serialize. + Indicates how the output should be formatted. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a collection of . + + The object to serialize. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using formatting and a collection of . + + The object to serialize. + Indicates how the output should be formatted. + A collection of converters used while serializing. + A JSON string representation of the object. + + + + Serializes the specified object to a JSON string using . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + A JSON string representation of the object. + + + + + Serializes the specified object to a JSON string using a type, formatting and . + + The object to serialize. + Indicates how the output should be formatted. + The used to serialize the object. + If this is null, default serialization settings will be used. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + A JSON string representation of the object. + + + + + Deserializes the JSON to a .NET object. + + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to a .NET object using . + + The JSON to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The JSON to deserialize. + The of object being deserialized. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type. + + The type of the object to deserialize to. + The JSON to deserialize. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the given anonymous type. + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the given anonymous type using . + + + The anonymous type to deserialize to. This can't be specified + traditionally and must be inferred from the anonymous type passed + as a parameter. + + The JSON to deserialize. + The anonymous type object. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized anonymous type from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The type of the object to deserialize to. + The JSON to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The type of the object to deserialize to. + The object to deserialize. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using a collection of . + + The JSON to deserialize. + The type of the object to deserialize. + Converters to use while deserializing. + The deserialized object from the JSON string. + + + + Deserializes the JSON to the specified .NET type using . + + The JSON to deserialize. + The type of the object to deserialize to. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + The deserialized object from the JSON string. + + + + Populates the object with values from the JSON string. + + The JSON to populate values from. + The target object to populate values onto. + + + + Populates the object with values from the JSON string using . + + The JSON to populate values from. + The target object to populate values onto. + + The used to deserialize the object. + If this is null, default serialization settings will be used. + + + + + Serializes the to a JSON string. + + The node to convert to JSON. + A JSON string of the . + + + + Serializes the to a JSON string using formatting. + + The node to convert to JSON. + Indicates how the output should be formatted. + A JSON string of the . + + + + Serializes the to a JSON string using formatting and omits the root object if is true. + + The node to serialize. + Indicates how the output should be formatted. + Omits writing the root object. + A JSON string of the . + + + + Deserializes the from a JSON string. + + The JSON string. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by . + + The JSON string. + The name of the root element to append when deserializing. + The deserialized . + + + + Deserializes the from a JSON string nested in a root element specified by + and writes a Json.NET array attribute for collections. + + The JSON string. + The name of the root element to append when deserializing. + + A flag to indicate whether to write the Json.NET array attribute. + This attribute helps preserve arrays when converting the written XML back to JSON. + + The deserialized . + + + + Converts an object to and from JSON. + + + + + Writes the JSON representation of the object. + + The to write to. + The value. + The calling serializer. + + + + Reads the JSON representation of the object. + + The to read from. + Type of the object. + The existing value of object being read. + The calling serializer. + The object value. + + + + Determines whether this instance can convert the specified object type. + + Type of the object. + + true if this instance can convert the specified object type; otherwise, false. + + + + + Gets a value indicating whether this can read JSON. + + true if this can read JSON; otherwise, false. + + + + Gets a value indicating whether this can write JSON. + + true if this can write JSON; otherwise, false. + + + + Instructs the to use the specified when serializing the member or class. + + + + + Gets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + + + + + Initializes a new instance of the class. + + Type of the . + + + + Initializes a new instance of the class. + + Type of the . + Parameter list to use when constructing the . Can be null. + + + + Represents a collection of . + + + + + Instructs the how to serialize the collection. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to deserialize properties with no matching class member into the specified collection + and write values during serialization. + + + + + Gets or sets a value that indicates whether to write extension data when serializing the object. + + + true to write extension data when serializing the object; otherwise, false. The default is true. + + + + + Gets or sets a value that indicates whether to read extension data when deserializing the object. + + + true to read extension data when deserializing the object; otherwise, false. The default is true. + + + + + Initializes a new instance of the class. + + + + + Instructs the not to serialize the public field or public read/write property value. + + + + + Instructs the how to serialize the object. + + + + + Gets or sets the member serialization. + + The member serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified member serialization. + + The member serialization. + + + + Initializes a new instance of the class with the specified container Id. + + The container Id. + + + + Instructs the to always serialize the member with the specified name. + + + + + Gets or sets the used when serializing the property's collection items. + + The collection's items . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(ItemConverterType = typeof(MyContainerConverter), ItemConverterParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the of the . + + The of the . + + + + The parameter list to use when constructing the described by . + If null, the default constructor is used. + When non-null, there must be a constructor defined in the that exactly matches the number, + order, and type of these parameters. + + + + [JsonProperty(NamingStrategyType = typeof(MyNamingStrategy), NamingStrategyParameters = new object[] { 123, "Four" })] + + + + + + Gets or sets the null value handling used when serializing this property. + + The null value handling. + + + + Gets or sets the default value handling used when serializing this property. + + The default value handling. + + + + Gets or sets the reference loop handling used when serializing this property. + + The reference loop handling. + + + + Gets or sets the object creation handling used when deserializing this property. + + The object creation handling. + + + + Gets or sets the type name handling used when serializing this property. + + The type name handling. + + + + Gets or sets whether this property's value is serialized as a reference. + + Whether this property's value is serialized as a reference. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets a value indicating whether this property is required. + + + A value indicating whether this property is required. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class with the specified name. + + Name of the property. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously skips the children of the current token. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Specifies the state of the reader. + + + + + A read method has not been called. + + + + + The end of the file has been reached successfully. + + + + + Reader is at a property. + + + + + Reader is at the start of an object. + + + + + Reader is in an object. + + + + + Reader is at the start of an array. + + + + + Reader is in an array. + + + + + The method has been called. + + + + + Reader has just read a value. + + + + + Reader is at the start of a constructor. + + + + + Reader is in a constructor. + + + + + An error occurred that prevents the read operation from continuing. + + + + + The end of the file has been reached successfully. + + + + + Gets the current reader state. + + The current reader state. + + + + Gets or sets a value indicating whether the source should be closed when this reader is closed. + + + true to close the source when this reader is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether multiple pieces of JSON content can + be read from a continuous stream without erroring. + + + true to support reading multiple pieces of JSON content; otherwise false. + The default is false. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + Gets or sets how time zones are handled when reading JSON. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how custom date formatted strings are parsed when reading JSON. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets the type of the current JSON token. + + + + + Gets the text value of the current JSON token. + + + + + Gets the .NET type for the current JSON token. + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Reads the next JSON token from the source. + + true if the next token was read successfully; false if there are no more tokens to read. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the source as a of . + + A of . This method will return null at the end of an array. + + + + Skips the children of the current token. + + + + + Sets the current token. + + The new token. + + + + Sets the current token and value. + + The new token. + The value. + + + + Sets the current token and value. + + The new token. + The value. + A flag indicating whether the position index inside an array should be updated. + + + + Sets the state based on current token type. + + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Changes the reader's state to . + If is set to true, the source is also closed. + + + + + The exception thrown when an error occurs while reading JSON text. + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path, line number, line position, and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The line number indicating where the error occurred. + The line position indicating where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Instructs the to always serialize the member, and to require that the member has a value. + + + + + The exception thrown when an error occurs during JSON serialization or deserialization. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Serializes and deserializes objects into and from the JSON format. + The enables you to control how objects are encoded into JSON. + + + + + Occurs when the errors during serialization and deserialization. + + + + + Gets or sets the used by the serializer when resolving references. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when resolving type names. + + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how object references are preserved by the serializer. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) is handled. + + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + + + + Gets or sets how null values are handled during serialization and deserialization. + + + + + Gets or sets how default values are handled during serialization and deserialization. + + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets a collection that will be used during serialization. + + Collection that will be used during serialization. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Gets a value indicating whether there will be a check for additional JSON content after deserializing an object. + + + true if there will be a check for additional JSON content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Creates a new instance. + The will not use default settings + from . + + + A new instance. + The will not use default settings + from . + + + + + Creates a new instance using the specified . + The will not use default settings + from . + + The settings to be applied to the . + + A new instance using the specified . + The will not use default settings + from . + + + + + Creates a new instance. + The will use default settings + from . + + + A new instance. + The will use default settings + from . + + + + + Creates a new instance using the specified . + The will use default settings + from as well as the specified . + + The settings to be applied to the . + + A new instance using the specified . + The will use default settings + from as well as the specified . + + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Populates the JSON values onto the target object. + + The that contains the JSON structure to reader values from. + The target object to populate values onto. + + + + Deserializes the JSON structure contained by the specified . + + The that contains the JSON structure to deserialize. + The being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The type of the object to deserialize. + The instance of being deserialized. + + + + Deserializes the JSON structure contained by the specified + into an instance of the specified type. + + The containing the object. + The of object being deserialized. + The instance of being deserialized. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + The type of the value being serialized. + This parameter is used when is Auto to write out the type name if the type of the value does not match. + Specifying the type is optional. + + + + + Serializes the specified and writes the JSON structure + using the specified . + + The used to write the JSON structure. + The to serialize. + + + + Specifies the settings on a object. + + + + + Gets or sets how reference loops (e.g. a class referencing itself) are handled. + + Reference loop handling. + + + + Gets or sets how missing members (e.g. JSON contains a property that isn't a member on the object) are handled during deserialization. + + Missing member handling. + + + + Gets or sets how objects are created during deserialization. + + The object creation handling. + + + + Gets or sets how null values are handled during serialization and deserialization. + + Null value handling. + + + + Gets or sets how default values are handled during serialization and deserialization. + + The default value handling. + + + + Gets or sets a collection that will be used during serialization. + + The converters. + + + + Gets or sets how object references are preserved by the serializer. + + The preserve references handling. + + + + Gets or sets how type name writing and reading is handled by the serializer. + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + The type name handling. + + + + Gets or sets how metadata properties are used during deserialization. + + The metadata properties handling. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how a type name assembly is written and resolved by the serializer. + + The type name assembly format. + + + + Gets or sets how constructors are used during deserialization. + + The constructor handling. + + + + Gets or sets the contract resolver used by the serializer when + serializing .NET objects to JSON and vice versa. + + The contract resolver. + + + + Gets or sets the equality comparer used by the serializer when comparing references. + + The equality comparer. + + + + Gets or sets the used by the serializer when resolving references. + + The reference resolver. + + + + Gets or sets a function that creates the used by the serializer when resolving references. + + A function that creates the used by the serializer when resolving references. + + + + Gets or sets the used by the serializer when writing trace messages. + + The trace writer. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the used by the serializer when resolving type names. + + The binder. + + + + Gets or sets the error handler called during serialization and deserialization. + + The error handler called during serialization and deserialization. + + + + Gets or sets the used by the serializer when invoking serialization callback methods. + + The context. + + + + Gets or sets how and values are formatted when writing JSON text, + and the expected date format when reading JSON text. + + + + + Gets or sets the maximum depth allowed when reading JSON. Reading past this depth will throw a . + + + + + Indicates how JSON text output is formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled during serialization and deserialization. + + + + + Gets or sets how date formatted strings, e.g. "\/Date(1198908717056)\/" and "2012-03-21T05:40Z", are parsed when reading JSON. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written as JSON. + + + + + Gets or sets how floating point numbers, e.g. 1.0 and 9.9, are parsed when reading JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets the culture used when reading JSON. Defaults to . + + + + + Gets a value indicating whether there will be a check for additional content after deserializing an object. + + + true if there will be a check for additional content after deserializing an object; otherwise, false. + + + + + Initializes a new instance of the class. + + + + + Represents a reader that provides fast, non-cached, forward-only access to JSON text data. + + + + + Asynchronously reads the next JSON token from the source. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns true if the next token was read successfully; false if there are no more tokens to read. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a []. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the []. This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a of . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the of . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously reads the next JSON token from the source as a . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous read. The + property returns the . This result will be null at the end of an array. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Initializes a new instance of the class with the specified . + + The containing the JSON data to read. + + + + Gets or sets the reader's character buffer pool. + + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a []. + + A [] or null if the next JSON token is null. This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Gets a value indicating whether the class can return line information. + + + true if and can be provided; otherwise, false. + + + + + Gets the current line number. + + + The current line number or 0 if no line information is available (for example, returns false). + + + + + Gets the current line position. + + + The current line position or 0 if no line information is available (for example, returns false). + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + Derived classes must override this method to get asynchronous behaviour. Otherwise it will + execute synchronously, returning an already-completed task. + + + + Gets or sets the writer's character array pool. + + + + + Gets or sets how many s to write for each level in the hierarchy when is set to . + + + + + Gets or sets which character to use to quote attribute values. + + + + + Gets or sets which character to use for indenting when is set to . + + + + + Gets or sets a value indicating whether object names will be surrounded with quotes. + + + + + Initializes a new instance of the class using the specified . + + The to write to. + + + + Flushes whatever is in the buffer to the underlying and also flushes the underlying . + + + + + Closes this writer. + If is set to true, the underlying is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the specified end token. + + The end token to write. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Asynchronously closes this writer. + If is set to true, the destination is also closed. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously flushes whatever is in the buffer to the destination and also flushes the destination. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the specified end token. + + The end token to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes indent characters. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the JSON value delimiter. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an indent space. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON without changing the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of the current JSON object or array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of an array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a constructor. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the end of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a null value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON array. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the start of a constructor with the given name. + + The name of the constructor. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the beginning of a JSON object. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a [] value. + + The [] value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a value. + + The value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes a of value. + + The of value to write. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes an undefined value. + + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously writes the given white space. + + The string of white space characters. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Asynchronously ets the state of the . + + The being written. + The value being written. + The token to monitor for cancellation requests. The default value is . + A that represents the asynchronous operation. + The default behaviour is to execute synchronously, returning an already-completed task. Derived + classes can override this behaviour for true asychronousity. + + + + Gets or sets a value indicating whether the destination should be closed when this writer is closed. + + + true to close the destination when this writer is closed; otherwise false. The default is true. + + + + + Gets or sets a value indicating whether the JSON should be auto-completed when this writer is closed. + + + true to auto-complete the JSON when this writer is closed; otherwise false. The default is true. + + + + + Gets the top. + + The top. + + + + Gets the state of the writer. + + + + + Gets the path of the writer. + + + + + Gets or sets a value indicating how JSON text output should be formatted. + + + + + Gets or sets how dates are written to JSON text. + + + + + Gets or sets how time zones are handled when writing JSON text. + + + + + Gets or sets how strings are escaped when writing JSON text. + + + + + Gets or sets how special floating point numbers, e.g. , + and , + are written to JSON text. + + + + + Gets or sets how and values are formatted when writing JSON text. + + + + + Gets or sets the culture used when writing JSON. Defaults to . + + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the destination and also flushes the destination. + + + + + Closes this writer. + If is set to true, the destination is also closed. + If is set to true, the JSON is auto-completed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the end of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the end of an array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end constructor. + + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + + + + Writes the property name of a name/value pair of a JSON object. + + The name of the property. + A flag to indicate whether the text should be escaped when it is written as a JSON property name. + + + + Writes the end of the current JSON object or array. + + + + + Writes the current token and its children. + + The to read the token from. + + + + Writes the current token. + + The to read the token from. + A flag indicating whether the current token's children should be written. + + + + Writes the token and its value. + + The to write. + + The value to write. + A value is only required for tokens that have an associated value, e.g. the property name for . + null can be passed to the method for tokens that don't have a value, e.g. . + + + + + Writes the token. + + The to write. + + + + Writes the specified end token. + + The end token to write. + + + + Writes indent characters. + + + + + Writes the JSON value delimiter. + + + + + Writes an indent space. + + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON without changing the writer's state. + + The raw JSON to write. + + + + Writes raw JSON where a value is expected and updates the writer's state. + + The raw JSON to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a of value. + + The of value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + An error will raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes the given white space. + + The string of white space characters. + + + + Releases unmanaged and - optionally - managed resources. + + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + Sets the state of the . + + The being written. + The value being written. + + + + Specifies the type of JSON token. + + + + + This is returned by the if a read method has not been called. + + + + + An object start token. + + + + + An array start token. + + + + + A constructor start token. + + + + + An object property name. + + + + + A comment. + + + + + Raw JSON. + + + + + An integer. + + + + + A float. + + + + + A string. + + + + + A boolean. + + + + + A null token. + + + + + An undefined token. + + + + + An object end token. + + + + + An array end token. + + + + + A constructor end token. + + + + + A Date. + + + + + Byte data. + + + + + + Represents a reader that provides validation. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Sets an event handler for receiving schema validation errors. + + + + + Gets the text value of the current JSON token. + + + + + + Gets the depth of the current token in the JSON document. + + The depth of the current token in the JSON document. + + + + Gets the path of the current JSON token. + + + + + Gets the quotation mark character used to enclose the value of a string. + + + + + + Gets the type of the current JSON token. + + + + + + Gets the .NET type for the current JSON token. + + + + + + Initializes a new instance of the class that + validates the content returned from the given . + + The to read from while validating. + + + + Gets or sets the schema. + + The schema. + + + + Gets the used to construct this . + + The specified in the constructor. + + + + Changes the reader's state to . + If is set to true, the underlying is also closed. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a []. + + + A [] or null if the next JSON token is null. + + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying as a . + + A . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . This method will return null at the end of an array. + + + + Reads the next JSON token from the underlying as a of . + + A of . + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + The exception thrown when an error occurs while writing JSON text. + + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Initializes a new instance of the class + with a specified error message, JSON path and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The path to the JSON where the error occurred. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + Specifies how JSON comments are handled when loading JSON. + + + + + Ignore comments. + + + + + Load comments as a with type . + + + + + Specifies how line information is handled when loading JSON. + + + + + Ignore line information. + + + + + Load line information. + + + + + Contains the LINQ to JSON extension methods. + + + + + Returns a collection of tokens that contains the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the ancestors of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, the ancestors of every token in the source collection. + + + + Returns a collection of tokens that contains the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains the descendants of every token in the source collection. + + + + Returns a collection of tokens that contains every token in the source collection, and the descendants of every token in the source collection. + + The type of the objects in source, constrained to . + An of that contains the source collection. + An of that contains every token in the source collection, and the descendants of every token in the source collection. + + + + Returns a collection of child properties of every object in the source collection. + + An of that contains the source collection. + An of that contains the properties of every object in the source collection. + + + + Returns a collection of child values of every object in the source collection with the given key. + + An of that contains the source collection. + The token key. + An of that contains the values of every token in the source collection with the given key. + + + + Returns a collection of child values of every object in the source collection. + + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child values of every object in the source collection with the given key. + + The type to convert the values to. + An of that contains the source collection. + The token key. + An that contains the converted values of every token in the source collection with the given key. + + + + Returns a collection of converted child values of every object in the source collection. + + The type to convert the values to. + An of that contains the source collection. + An that contains the converted values of every token in the source collection. + + + + Converts the value. + + The type to convert the value to. + A cast as a of . + A converted value. + + + + Converts the value. + + The source collection type. + The type to convert the value to. + A cast as a of . + A converted value. + + + + Returns a collection of child tokens of every array in the source collection. + + The source collection type. + An of that contains the source collection. + An of that contains the values of every token in the source collection. + + + + Returns a collection of converted child tokens of every array in the source collection. + + An of that contains the source collection. + The type to convert the values to. + The source collection type. + An that contains the converted values of every token in the source collection. + + + + Returns the input typed as . + + An of that contains the source collection. + The input typed as . + + + + Returns the input typed as . + + The source collection type. + An of that contains the source collection. + The input typed as . + + + + Represents a collection of objects. + + The type of token. + + + + Gets the of with the specified key. + + + + + + Represents a JSON array. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Initializes a new instance of the class with the specified content. + + The contents of the array. + + + + Loads an from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads an from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the at the specified index. + + + + + + Determines the index of a specific item in the . + + The object to locate in the . + + The index of if found in the list; otherwise, -1. + + + + + Inserts an item to the at the specified index. + + The zero-based index at which should be inserted. + The object to insert into the . + + is not a valid index in the . + + + + + Removes the item at the specified index. + + The zero-based index of the item to remove. + + is not a valid index in the . + + + + + Returns an enumerator that iterates through the collection. + + + A of that can be used to iterate through the collection. + + + + + Adds an item to the . + + The object to add to the . + + + + Removes all items from the . + + + + + Determines whether the contains a specific value. + + The object to locate in the . + + true if is found in the ; otherwise, false. + + + + + Copies the elements of the to an array, starting at a particular array index. + + The array. + Index of the array. + + + + Gets a value indicating whether the is read-only. + + true if the is read-only; otherwise, false. + + + + Removes the first occurrence of a specific object from the . + + The object to remove from the . + + true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous load. The property contains the JSON that was read from the specified . + + + + Represents a JSON constructor. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets or sets the name of this constructor. + + The constructor name. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name and content. + + The constructor name. + The contents of the constructor. + + + + Initializes a new instance of the class with the specified name. + + The constructor name. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified key. + + The with the specified key. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Represents a token that can contain other tokens. + + + + + Occurs when the items list of the collection has changed, or the collection is reset. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Raises the event. + + The instance containing the event data. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Get the first child token of this token. + + + A containing the first child token of the . + + + + + Get the last child token of this token. + + + A containing the last child token of the . + + + + + Returns a collection of the child tokens of this token, in document order. + + + An of containing the child tokens of this , in document order. + + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + + A containing the child values of this , in document order. + + + + + Returns a collection of the descendant tokens for this token in document order. + + An of containing the descendant tokens of the . + + + + Returns a collection of the tokens that contain this token, and all descendant tokens of this token, in document order. + + An of containing this token, and all the descendant tokens of the . + + + + Adds the specified content as children of this . + + The content to be added. + + + + Adds the specified content as the first children of this . + + The content to be added. + + + + Creates a that can be used to add tokens to the . + + A that is ready to have content written to it. + + + + Replaces the child nodes of this token with the specified content. + + The content. + + + + Removes the child nodes from this token. + + + + + Merge the specified content into this . + + The content to be merged. + + + + Merge the specified content into this using . + + The content to be merged. + The used to merge the content. + + + + Gets the count of child JSON tokens. + + The count of child JSON tokens. + + + + Represents a collection of objects. + + The type of token. + + + + An empty collection of objects. + + + + + Initializes a new instance of the struct. + + The enumerable. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Gets the of with the specified key. + + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Determines whether the specified is equal to this instance. + + The to compare with this instance. + + true if the specified is equal to this instance; otherwise, false. + + + + + Returns a hash code for this instance. + + + A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. + + + + + Represents a JSON object. + + + + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Occurs when a property value changes. + + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Initializes a new instance of the class with the specified content. + + The contents of the object. + + + + Gets the node type for this . + + The type. + + + + Gets an of of this object's properties. + + An of of this object's properties. + + + + Gets a the specified name. + + The property name. + A with the specified name or null. + + + + Gets a of of this object's property values. + + A of of this object's property values. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets or sets the with the specified property name. + + + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + is not valid JSON. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + is not valid JSON. + + + + + + + + Creates a from an object. + + The object that will be used to create . + A with the values of the specified object. + + + + Creates a from an object. + + The object that will be used to create . + The that will be used to read the object. + A with the values of the specified object. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Gets the with the specified property name. + + Name of the property. + The with the specified property name. + + + + Gets the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + One of the enumeration values that specifies how the strings will be compared. + The with the specified property name. + + + + Tries to get the with the specified property name. + The exact property name will be searched for first and if no matching property is found then + the will be used to match a property. + + Name of the property. + The value. + One of the enumeration values that specifies how the strings will be compared. + true if a value was successfully retrieved; otherwise, false. + + + + Adds the specified property name. + + Name of the property. + The value. + + + + Removes the property with the specified name. + + Name of the property. + true if item was successfully removed; otherwise, false. + + + + Tries to get the with the specified property name. + + Name of the property. + The value. + true if a value was successfully retrieved; otherwise, false. + + + + Returns an enumerator that can be used to iterate through the collection. + + + A that can be used to iterate through the collection. + + + + + Raises the event with the provided arguments. + + Name of the property. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous load. The + property returns a that contains the JSON that was read from the specified . + + + + Represents a JSON property. + + + + + Gets the container's children tokens. + + The container's children tokens. + + + + Gets the property name. + + The property name. + + + + Gets or sets the property value. + + The property value. + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Gets the node type for this . + + The type. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Initializes a new instance of the class. + + The property name. + The property content. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Loads a from a . + + A that will be read for the content of the . + A that contains the JSON that was read from the specified . + + + + Loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + A that contains the JSON that was read from the specified . + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Asynchronously loads a from a . + + A that will be read for the content of the . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns a that contains the JSON that was read from the specified . + + + + Represents a raw JSON string. + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class. + + The raw json. + + + + Creates an instance of with the content of the reader's current token. + + The reader. + An instance of with the content of the reader's current token. + + + + Asynchronously creates an instance of with the content of the reader's current token. + + The reader. + The token to monitor for cancellation requests. The default value is . + A representing the asynchronous creation. The + property returns an instance of with the content of the reader's current token. + + + + Specifies the settings used when loading JSON. + + + + + Gets or sets how JSON comments are handled when loading JSON. + + The JSON comment handling. + + + + Gets or sets how JSON line info is handled when loading JSON. + + The JSON line info handling. + + + + Specifies the settings used when merging JSON. + + + + + Gets or sets the method used when merging JSON arrays. + + The method used when merging JSON arrays. + + + + Gets or sets how null value properties are merged. + + How null value properties are merged. + + + + Represents an abstract JSON token. + + + + + Gets a comparer that can compare two tokens for value equality. + + A that can compare two nodes for value equality. + + + + Gets or sets the parent. + + The parent. + + + + Gets the root of this . + + The root of this . + + + + Gets the node type for this . + + The type. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Compares the values of two tokens, including the values of all descendant tokens. + + The first to compare. + The second to compare. + true if the tokens are equal; otherwise false. + + + + Gets the next sibling token of this node. + + The that contains the next sibling token. + + + + Gets the previous sibling token of this node. + + The that contains the previous sibling token. + + + + Gets the path of the JSON token. + + + + + Adds the specified content immediately after this token. + + A content object that contains simple content or a collection of content objects to be added after this token. + + + + Adds the specified content immediately before this token. + + A content object that contains simple content or a collection of content objects to be added before this token. + + + + Returns a collection of the ancestor tokens of this token. + + A collection of the ancestor tokens of this token. + + + + Returns a collection of tokens that contain this token, and the ancestors of this token. + + A collection of tokens that contain this token, and the ancestors of this token. + + + + Returns a collection of the sibling tokens after this token, in document order. + + A collection of the sibling tokens after this tokens, in document order. + + + + Returns a collection of the sibling tokens before this token, in document order. + + A collection of the sibling tokens before this token, in document order. + + + + Gets the with the specified key. + + The with the specified key. + + + + Gets the with the specified key converted to the specified type. + + The type to convert the token to. + The token key. + The converted token value. + + + + Get the first child token of this token. + + A containing the first child token of the . + + + + Get the last child token of this token. + + A containing the last child token of the . + + + + Returns a collection of the child tokens of this token, in document order. + + An of containing the child tokens of this , in document order. + + + + Returns a collection of the child tokens of this token, in document order, filtered by the specified type. + + The type to filter the child tokens on. + A containing the child tokens of this , in document order. + + + + Returns a collection of the child values of this token, in document order. + + The type to convert the values to. + A containing the child values of this , in document order. + + + + Removes this token from its parent. + + + + + Replaces this token with the specified token. + + The value. + + + + Writes this token to a . + + A into which this method will write. + A collection of which will be used when writing the token. + + + + Returns the indented JSON for this token. + + + The indented JSON for this token. + + + + + Returns the JSON for this token using the given formatting and converters. + + Indicates how the output should be formatted. + A collection of s which will be used when writing the token. + The JSON for this token using the given formatting and converters. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to []. + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to of . + + The value. + The result of the conversion. + + + + Performs an explicit conversion from to . + + The value. + The result of the conversion. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from [] to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from to . + + The value to create a from. + The initialized with the specified value. + + + + Performs an implicit conversion from of to . + + The value to create a from. + The initialized with the specified value. + + + + Creates a for this token. + + A that can be used to read this token and its descendants. + + + + Creates a from an object. + + The object that will be used to create . + A with the value of the specified object. + + + + Creates a from an object using the specified . + + The object that will be used to create . + The that will be used when reading the object. + A with the value of the specified object. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the . + + The object type that the token will be deserialized to. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates an instance of the specified .NET type from the using the specified . + + The object type that the token will be deserialized to. + The that will be used when creating the object. + The new object created from the JSON value. + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Load a from a string that contains JSON. + + A that contains JSON. + A populated from the string that contains JSON. + + + + Load a from a string that contains JSON. + + A that contains JSON. + The used to load the JSON. + If this is null, default load settings will be used. + A populated from the string that contains JSON. + + + + Creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Creates a from a . + + A positioned at the token to read into this . + + A that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A , or null. + + + + Selects a using a JPath expression. Selects the token that matches the object path. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + A . + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + An of that contains the selected elements. + + + + Selects a collection of elements using a JPath expression. + + + A that contains a JPath expression. + + A flag to indicate whether an error should be thrown if no tokens are found when evaluating part of the expression. + An of that contains the selected elements. + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Creates a new instance of the . All child tokens are recursively cloned. + + A new instance of the . + + + + Adds an object to the annotation list of this . + + The annotation to add. + + + + Get the first annotation object of the specified type from this . + + The type of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets the first annotation object of the specified type from this . + + The of the annotation to retrieve. + The first annotation object that matches the specified type, or null if no annotation is of the specified type. + + + + Gets a collection of annotations of the specified type for this . + + The type of the annotations to retrieve. + An that contains the annotations for this . + + + + Gets a collection of annotations of the specified type for this . + + The of the annotations to retrieve. + An of that contains the annotations that match the specified type for this . + + + + Removes the annotations of the specified type from this . + + The type of annotations to remove. + + + + Removes the annotations of the specified type from this . + + The of annotations to remove. + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Writes this token to a asynchronously. + + A into which this method will write. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + An positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains + the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Asynchronously creates a from a . + + A positioned at the token to read into this . + The used to load the JSON. + If this is null, default load settings will be used. + The token to monitor for cancellation requests. The default value is . + + A that represents the asynchronous creation. The + property returns a that contains the token and its descendant tokens + that were read from the reader. The runtime type of the token is determined + by the token type of the first token encountered in the reader. + + + + + Compares tokens to determine whether they are equal. + + + + + Determines whether the specified objects are equal. + + The first object of type to compare. + The second object of type to compare. + + true if the specified objects are equal; otherwise, false. + + + + + Returns a hash code for the specified object. + + The for which a hash code is to be returned. + A hash code for the specified object. + The type of is a reference type and is null. + + + + Represents a reader that provides fast, non-cached, forward-only access to serialized JSON data. + + + + + Gets the at the reader's current position. + + + + + Initializes a new instance of the class. + + The token to read from. + + + + Reads the next JSON token from the underlying . + + + true if the next token was read successfully; false if there are no more tokens to read. + + + + + Gets the path of the current JSON token. + + + + + Specifies the type of token. + + + + + No token type has been set. + + + + + A JSON object. + + + + + A JSON array. + + + + + A JSON constructor. + + + + + A JSON object property. + + + + + A comment. + + + + + An integer value. + + + + + A float value. + + + + + A string value. + + + + + A boolean value. + + + + + A null value. + + + + + An undefined value. + + + + + A date value. + + + + + A raw JSON value. + + + + + A collection of bytes value. + + + + + A Guid value. + + + + + A Uri value. + + + + + A TimeSpan value. + + + + + Represents a writer that provides a fast, non-cached, forward-only way of generating JSON data. + + + + + Gets the at the writer's current position. + + + + + Gets the token being written. + + The token being written. + + + + Initializes a new instance of the class writing to the given . + + The container being written to. + + + + Initializes a new instance of the class. + + + + + Flushes whatever is in the buffer to the underlying . + + + + + Closes this writer. + If is set to true, the JSON is auto-completed. + + + Setting to true has no additional effect, since the underlying is a type that cannot be closed. + + + + + Writes the beginning of a JSON object. + + + + + Writes the beginning of a JSON array. + + + + + Writes the start of a constructor with the given name. + + The name of the constructor. + + + + Writes the end. + + The token. + + + + Writes the property name of a name/value pair on a JSON object. + + The name of the property. + + + + Writes a value. + An error will be raised if the value cannot be written as a single JSON token. + + The value to write. + + + + Writes a null value. + + + + + Writes an undefined value. + + + + + Writes raw JSON. + + The raw JSON to write. + + + + Writes a comment /*...*/ containing the specified text. + + Text to place inside the comment. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a [] value. + + The [] value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Writes a value. + + The value to write. + + + + Represents a value in JSON (string, integer, date, etc). + + + + + Initializes a new instance of the class from another object. + + A object to copy from. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Initializes a new instance of the class with the given value. + + The value. + + + + Gets a value indicating whether this token has child tokens. + + + true if this token has child values; otherwise, false. + + + + + Creates a comment with the given value. + + The value. + A comment with the given value. + + + + Creates a string with the given value. + + The value. + A string with the given value. + + + + Creates a null value. + + A null value. + + + + Creates a undefined value. + + A undefined value. + + + + Gets the node type for this . + + The type. + + + + Gets or sets the underlying token value. + + The underlying token value. + + + + Writes this token to a . + + A into which this method will write. + A collection of s which will be used when writing the token. + + + + Indicates whether the current object is equal to another object of the same type. + + + true if the current object is equal to the parameter; otherwise, false. + + An object to compare with this object. + + + + Determines whether the specified is equal to the current . + + The to compare with the current . + + true if the specified is equal to the current ; otherwise, false. + + + + + Serves as a hash function for a particular type. + + + A hash code for the current . + + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format provider. + + A that represents this instance. + + + + + Returns a that represents this instance. + + The format. + The format provider. + + A that represents this instance. + + + + + Returns the responsible for binding operations performed on this object. + + The expression tree representation of the runtime value. + + The to bind this object. + + + + + Compares the current instance with another object of the same type and returns an integer that indicates whether the current instance precedes, follows, or occurs in the same position in the sort order as the other object. + + An object to compare with this instance. + + A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has these meanings: + Value + Meaning + Less than zero + This instance is less than . + Zero + This instance is equal to . + Greater than zero + This instance is greater than . + + + is not of the same type as this instance. + + + + + Writes this token to a asynchronously. + + A into which this method will write. + The token to monitor for cancellation requests. + A collection of which will be used when writing the token. + A that represents the asynchronous write operation. + + + + Specifies how JSON arrays are merged together. + + + + Concatenate arrays. + + + Union arrays, skipping items that already exist. + + + Replace all array items. + + + Merge array items together, matched by index. + + + + Specifies how null value properties are merged. + + + + + The content's null value properties will be ignored during merging. + + + + + The content's null value properties will be merged. + + + + + Specifies the member serialization options for the . + + + + + All public members are serialized by default. Members can be excluded using or . + This is the default member serialization mode. + + + + + Only members marked with or are serialized. + This member serialization mode can also be set by marking the class with . + + + + + All public and private fields are serialized. Members can be excluded using or . + This member serialization mode can also be set by marking the class with + and setting IgnoreSerializableAttribute on to false. + + + + + Specifies metadata property handling options for the . + + + + + Read metadata properties located at the start of a JSON object. + + + + + Read metadata properties located anywhere in a JSON object. Note that this setting will impact performance. + + + + + Do not try to read metadata properties. + + + + + Specifies missing member handling options for the . + + + + + Ignore a missing member and do not attempt to deserialize it. + + + + + Throw a when a missing member is encountered during deserialization. + + + + + Specifies null value handling options for the . + + + + + + + + + Include null values when serializing and deserializing objects. + + + + + Ignore null values when serializing and deserializing objects. + + + + + Specifies how object creation is handled by the . + + + + + Reuse existing objects, create new objects when needed. + + + + + Only reuse existing objects. + + + + + Always create new objects. + + + + + Specifies reference handling options for the . + Note that references cannot be preserved when a value is set via a non-default constructor such as types that implement . + + + + + + + + Do not preserve references when serializing types. + + + + + Preserve references when serializing into a JSON object structure. + + + + + Preserve references when serializing into a JSON array structure. + + + + + Preserve references when serializing. + + + + + Specifies reference loop handling options for the . + + + + + Throw a when a loop is encountered. + + + + + Ignore loop references and do not serialize. + + + + + Serialize loop references. + + + + + Indicating whether a property is required. + + + + + The property is not required. The default state. + + + + + The property must be defined in JSON but can be a null value. + + + + + The property must be defined in JSON and cannot be a null value. + + + + + The property is not required but it cannot be a null value. + + + + + + Contains the JSON schema extension methods. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + true if the specified is valid; otherwise, false. + + + + + + Determines whether the is valid. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + When this method returns, contains any error messages generated while validating. + + true if the specified is valid; otherwise, false. + + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + + + + + Validates the specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + The source to test. + The schema to test with. + The validation event handler. + + + + + An in-memory representation of a JSON Schema. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the id. + + + + + Gets or sets the title. + + + + + Gets or sets whether the object is required. + + + + + Gets or sets whether the object is read-only. + + + + + Gets or sets whether the object is visible to users. + + + + + Gets or sets whether the object is transient. + + + + + Gets or sets the description of the object. + + + + + Gets or sets the types of values allowed by the object. + + The type. + + + + Gets or sets the pattern. + + The pattern. + + + + Gets or sets the minimum length. + + The minimum length. + + + + Gets or sets the maximum length. + + The maximum length. + + + + Gets or sets a number that the value should be divisible by. + + A number that the value should be divisible by. + + + + Gets or sets the minimum. + + The minimum. + + + + Gets or sets the maximum. + + The maximum. + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the minimum attribute (). + + A flag indicating whether the value can not equal the number defined by the minimum attribute (). + + + + Gets or sets a flag indicating whether the value can not equal the number defined by the maximum attribute (). + + A flag indicating whether the value can not equal the number defined by the maximum attribute (). + + + + Gets or sets the minimum number of items. + + The minimum number of items. + + + + Gets or sets the maximum number of items. + + The maximum number of items. + + + + Gets or sets the of items. + + The of items. + + + + Gets or sets a value indicating whether items in an array are validated using the instance at their array position from . + + + true if items are validated using their array position; otherwise, false. + + + + + Gets or sets the of additional items. + + The of additional items. + + + + Gets or sets a value indicating whether additional items are allowed. + + + true if additional items are allowed; otherwise, false. + + + + + Gets or sets whether the array items must be unique. + + + + + Gets or sets the of properties. + + The of properties. + + + + Gets or sets the of additional properties. + + The of additional properties. + + + + Gets or sets the pattern properties. + + The pattern properties. + + + + Gets or sets a value indicating whether additional properties are allowed. + + + true if additional properties are allowed; otherwise, false. + + + + + Gets or sets the required property if this property is present. + + The required property if this property is present. + + + + Gets or sets the a collection of valid enum values allowed. + + A collection of valid enum values allowed. + + + + Gets or sets disallowed types. + + The disallowed types. + + + + Gets or sets the default value. + + The default value. + + + + Gets or sets the collection of that this schema extends. + + The collection of that this schema extends. + + + + Gets or sets the format. + + The format. + + + + Initializes a new instance of the class. + + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The object representing the JSON Schema. + + + + Reads a from the specified . + + The containing the JSON Schema to read. + The to use when resolving schema references. + The object representing the JSON Schema. + + + + Load a from a string that contains JSON Schema. + + A that contains JSON Schema. + A populated from the string that contains JSON Schema. + + + + Load a from a string that contains JSON Schema using the specified . + + A that contains JSON Schema. + The resolver. + A populated from the string that contains JSON Schema. + + + + Writes this schema to a . + + A into which this method will write. + + + + Writes this schema to a using the specified . + + A into which this method will write. + The resolver used. + + + + Returns a that represents the current . + + + A that represents the current . + + + + + + Returns detailed information about the schema exception. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the line number indicating where the error occurred. + + The line number indicating where the error occurred. + + + + Gets the line position indicating where the error occurred. + + The line position indicating where the error occurred. + + + + Gets the path to the JSON where the error occurred. + + The path to the JSON where the error occurred. + + + + Initializes a new instance of the class. + + + + + Initializes a new instance of the class + with a specified error message. + + The error message that explains the reason for the exception. + + + + Initializes a new instance of the class + with a specified error message and a reference to the inner exception that is the cause of this exception. + + The error message that explains the reason for the exception. + The exception that is the cause of the current exception, or null if no inner exception is specified. + + + + + Generates a from a specified . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets how undefined schemas are handled by the serializer. + + + + + Gets or sets the contract resolver. + + The contract resolver. + + + + Generate a from the specified type. + + The type to generate a from. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + Generate a from the specified type. + + The type to generate a from. + The used to resolve schema references. + Specify whether the generated root will be nullable. + A generated from the specified type. + + + + + Resolves from an id. + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets or sets the loaded schemas. + + The loaded schemas. + + + + Initializes a new instance of the class. + + + + + Gets a for the specified reference. + + The id. + A for the specified reference. + + + + + The value types allowed by the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + No type specified. + + + + + String type. + + + + + Float type. + + + + + Integer type. + + + + + Boolean type. + + + + + Object type. + + + + + Array type. + + + + + Null type. + + + + + Any type. + + + + + + Specifies undefined schema Id handling options for the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Do not infer a schema Id. + + + + + Use the .NET type name as the schema Id. + + + + + Use the assembly qualified .NET type name as the schema Id. + + + + + + Returns detailed information related to the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Gets the associated with the validation error. + + The JsonSchemaException associated with the validation error. + + + + Gets the path of the JSON location where the validation error occurred. + + The path of the JSON location where the validation error occurred. + + + + Gets the text description corresponding to the validation error. + + The text description. + + + + + Represents the callback method that will handle JSON schema validation events and the . + + + JSON Schema validation has been moved to its own package. See http://www.newtonsoft.com/jsonschema for more details. + + + + + + Allows users to control class loading and mandate what class to load. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + A camel case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Resolves member mappings for a type, camel casing property names. + + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + The default naming strategy. Property names and dictionary keys are unchanged. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Get and set values for a using dynamic methods. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Used by to resolve a for a given . + + + + + Gets a value indicating whether members are being get and set using dynamic code generation. + This value is determined by the runtime permissions available. + + + true if using dynamic code generation; otherwise, false. + + + + + Gets or sets a value indicating whether compiler generated members should be serialized. + + + true if serialized compiler generated members; otherwise, false. + + + + + Gets or sets the naming strategy used to resolve how property names and dictionary keys are serialized. + + The naming strategy used to resolve how property names and dictionary keys are serialized. + + + + Initializes a new instance of the class. + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Gets the serializable members for the type. + + The type to get serializable members for. + The serializable members for the type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates the constructor parameters. + + The constructor to create properties for. + The type's member properties. + Properties for the given . + + + + Creates a for the given . + + The matching member property. + The constructor parameter. + A created for the given . + + + + Resolves the default for the contract. + + Type of the object. + The contract's default . + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Creates a for the given type. + + Type of the object. + A for the given type. + + + + Determines which contract type is created for the given type. + + Type of the object. + A for the given type. + + + + Creates properties for the given . + + The type to create properties for. + /// The member serialization mode for the type. + Properties for the given . + + + + Creates the used by the serializer to get and set values from a member. + + The member. + The used by the serializer to get and set values from a member. + + + + Creates a for the given . + + The member's parent . + The member to create a for. + A created for the given . + + + + Resolves the name of the property. + + Name of the property. + Resolved name of the property. + + + + Resolves the name of the extension data. By default no changes are made to extension data names. + + Name of the extension data. + Resolved name of the extension data. + + + + Resolves the key of the dictionary. By default is used to resolve dictionary keys. + + Key of the dictionary. + Resolved key of the dictionary. + + + + Gets the resolved name of the property. + + Name of the property. + Name of the property. + + + + The default serialization binder used when resolving and loading classes from type names. + + + + + Initializes a new instance of the class. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + The type of the object the formatter creates a new instance of. + + + + + When overridden in a derived class, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Provides information surrounding an error. + + + + + Gets the error. + + The error. + + + + Gets the original object that caused the error. + + The original object that caused the error. + + + + Gets the member that caused the error. + + The member that caused the error. + + + + Gets the path of the JSON location where the error occurred. + + The path of the JSON location where the error occurred. + + + + Gets or sets a value indicating whether this is handled. + + true if handled; otherwise, false. + + + + Provides data for the Error event. + + + + + Gets the current object the error event is being raised against. + + The current object the error event is being raised against. + + + + Gets the error context. + + The error context. + + + + Initializes a new instance of the class. + + The current object. + The error context. + + + + Provides methods to get attributes. + + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Used by to resolve a for a given . + + + + + + + + + Resolves the contract for a given type. + + The type to resolve a contract for. + The contract for a given type. + + + + Used to resolve references when serializing and deserializing JSON by the . + + + + + Resolves a reference to its object. + + The serialization context. + The reference to resolve. + The object that was resolved from the reference. + + + + Gets the reference for the specified object. + + The serialization context. + The object to get a reference for. + The reference to the object. + + + + Determines whether the specified object is referenced. + + The serialization context. + The object to test for a reference. + + true if the specified object is referenced; otherwise, false. + + + + + Adds a reference to the specified object. + + The serialization context. + The reference. + The object to reference. + + + + Allows users to control class loading and mandate what class to load. + + + + + When implemented, controls the binding of a serialized object to a type. + + Specifies the name of the serialized object. + Specifies the name of the serialized object + The type of the object the formatter creates a new instance of. + + + + When implemented, controls the binding of a serialized object to a type. + + The type of the object the formatter creates a new instance of. + Specifies the name of the serialized object. + Specifies the name of the serialized object. + + + + Represents a trace writer. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + The that will be used to filter the trace messages passed to the writer. + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Provides methods to get and set values. + + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + Contract details for a used by the . + + + + + Gets the of the collection items. + + The of the collection items. + + + + Gets a value indicating whether the collection type is a multidimensional array. + + true if the collection type is a multidimensional array; otherwise, false. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the collection values. + + true if the creator has a parameter with the collection values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the default collection items . + + The converter. + + + + Gets or sets a value indicating whether the collection items preserve object references. + + true if collection items preserve object references; otherwise, false. + + + + Gets or sets the collection item reference loop handling. + + The reference loop handling. + + + + Gets or sets the collection item type name handling. + + The type name handling. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Handles serialization callback events. + + The object that raised the callback event. + The streaming context. + + + + Handles serialization error callback events. + + The object that raised the callback event. + The streaming context. + The error context. + + + + Sets extension data for an object during deserialization. + + The object to set extension data on. + The extension data key. + The extension data value. + + + + Gets extension data for an object during serialization. + + The object to set extension data on. + + + + Contract details for a used by the . + + + + + Gets the underlying type for the contract. + + The underlying type for the contract. + + + + Gets or sets the type created during deserialization. + + The type created during deserialization. + + + + Gets or sets whether this type contract is serialized as a reference. + + Whether this type contract is serialized as a reference. + + + + Gets or sets the default for this contract. + + The converter. + + + + Gets or sets all methods called immediately after deserialization of the object. + + The methods called immediately after deserialization of the object. + + + + Gets or sets all methods called during deserialization of the object. + + The methods called during deserialization of the object. + + + + Gets or sets all methods called after serialization of the object graph. + + The methods called after serialization of the object graph. + + + + Gets or sets all methods called before serialization of the object. + + The methods called before serialization of the object. + + + + Gets or sets all method called when an error is thrown during the serialization of the object. + + The methods called when an error is thrown during the serialization of the object. + + + + Gets or sets the default creator method used to create the object. + + The default creator method used to create the object. + + + + Gets or sets a value indicating whether the default creator is non-public. + + true if the default object creator is non-public; otherwise, false. + + + + Contract details for a used by the . + + + + + Gets or sets the dictionary key resolver. + + The dictionary key resolver. + + + + Gets the of the dictionary keys. + + The of the dictionary keys. + + + + Gets the of the dictionary values. + + The of the dictionary values. + + + + Gets or sets the function used to create the object. When set this function will override . + + The function used to create the object. + + + + Gets a value indicating whether the creator has a parameter with the dictionary values. + + true if the creator has a parameter with the dictionary values; otherwise, false. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets the object's properties. + + The object's properties. + + + + Gets or sets the property name resolver. + + The property name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Gets or sets the object member serialization. + + The member object serialization. + + + + Gets or sets a value that indicates whether the object's properties are required. + + + A value indicating whether the object's properties are required. + + + + + Gets the object's properties. + + The object's properties. + + + + Gets a collection of instances that define the parameters used with . + + + + + Gets or sets the function used to create the object. When set this function will override . + This function is called with a collection of arguments which are defined by the collection. + + The function used to create the object. + + + + Gets or sets the extension data setter. + + + + + Gets or sets the extension data getter. + + + + + Gets or sets the extension data value type. + + + + + Gets or sets the extension data name resolver. + + The extension data name resolver. + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Maps a JSON property to a .NET member or constructor parameter. + + + + + Gets or sets the name of the property. + + The name of the property. + + + + Gets or sets the type that declared this property. + + The type that declared this property. + + + + Gets or sets the order of serialization of a member. + + The numeric order of serialization. + + + + Gets or sets the name of the underlying member or parameter. + + The name of the underlying member or parameter. + + + + Gets the that will get and set the during serialization. + + The that will get and set the during serialization. + + + + Gets or sets the for this property. + + The for this property. + + + + Gets or sets the type of the property. + + The type of the property. + + + + Gets or sets the for the property. + If set this converter takes precedence over the contract converter for the property type. + + The converter. + + + + Gets or sets the member converter. + + The member converter. + + + + Gets or sets a value indicating whether this is ignored. + + true if ignored; otherwise, false. + + + + Gets or sets a value indicating whether this is readable. + + true if readable; otherwise, false. + + + + Gets or sets a value indicating whether this is writable. + + true if writable; otherwise, false. + + + + Gets or sets a value indicating whether this has a member attribute. + + true if has a member attribute; otherwise, false. + + + + Gets the default value. + + The default value. + + + + Gets or sets a value indicating whether this is required. + + A value indicating whether this is required. + + + + Gets or sets a value indicating whether this property preserves object references. + + + true if this instance is reference; otherwise, false. + + + + + Gets or sets the property null value handling. + + The null value handling. + + + + Gets or sets the property default value handling. + + The default value handling. + + + + Gets or sets the property reference loop handling. + + The reference loop handling. + + + + Gets or sets the property object creation handling. + + The object creation handling. + + + + Gets or sets or sets the type name handling. + + The type name handling. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets a predicate used to determine whether the property should be deserialized. + + A predicate used to determine whether the property should be deserialized. + + + + Gets or sets a predicate used to determine whether the property should be serialized. + + A predicate used to determine whether the property should be serialized. + + + + Gets or sets an action used to set whether the property has been deserialized. + + An action used to set whether the property has been deserialized. + + + + Returns a that represents this instance. + + + A that represents this instance. + + + + + Gets or sets the converter used when serializing the property's collection items. + + The collection's items converter. + + + + Gets or sets whether this property's collection items are serialized as a reference. + + Whether this property's collection items are serialized as a reference. + + + + Gets or sets the type name handling used when serializing the property's collection items. + + The collection's items type name handling. + + + + Gets or sets the reference loop handling used when serializing the property's collection items. + + The collection's items reference loop handling. + + + + A collection of objects. + + + + + Initializes a new instance of the class. + + The type. + + + + When implemented in a derived class, extracts the key from the specified element. + + The element from which to extract the key. + The key for the specified element. + + + + Adds a object. + + The property to add to the collection. + + + + Gets the closest matching object. + First attempts to get an exact case match of and then + a case insensitive match. + + Name of the property. + A matching property if found. + + + + Gets a property by property name. + + The name of the property to get. + Type property name string comparison. + A matching property if found. + + + + Contract details for a used by the . + + + + + Initializes a new instance of the class. + + The underlying type for the contract. + + + + Lookup and create an instance of the type described by the argument. + + The type to create. + Optional arguments to pass to an initializing constructor of the JsonConverter. + If null, the default constructor is used. + + + + Represents a trace writer that writes to memory. When the trace message limit is + reached then old trace messages will be removed as new messages are added. + + + + + Gets the that will be used to filter the trace messages passed to the writer. + For example a filter level of will exclude messages and include , + and messages. + + + The that will be used to filter the trace messages passed to the writer. + + + + + Initializes a new instance of the class. + + + + + Writes the specified trace level, message and optional exception. + + The at which to write this trace. + The trace message. + The trace exception. This parameter is optional. + + + + Returns an enumeration of the most recent trace messages. + + An enumeration of the most recent trace messages. + + + + Returns a of the most recent trace messages. + + + A of the most recent trace messages. + + + + + A base class for resolving how property names and dictionary keys are serialized. + + + + + A flag indicating whether dictionary keys should be processed. + Defaults to false. + + + + + A flag indicating whether extension data names should be processed. + Defaults to false. + + + + + A flag indicating whether explicitly specified property names, + e.g. a property name customized with a , should be processed. + Defaults to false. + + + + + Gets the serialized name for a given property name. + + The initial property name. + A flag indicating whether the property has had a name explicitly specified. + The serialized property name. + + + + Gets the serialized name for a given extension data name. + + The initial extension data name. + The serialized extension data name. + + + + Gets the serialized key for a given dictionary key. + + The initial dictionary key. + The serialized dictionary key. + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Represents a method that constructs an object. + + The object type to create. + + + + When applied to a method, specifies that the method is called when an error occurs serializing an object. + + + + + Provides methods to get attributes from a , , or . + + + + + Initializes a new instance of the class. + + The instance to get attributes for. This parameter should be a , , or . + + + + Returns a collection of all of the attributes, or an empty collection if there are no attributes. + + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Returns a collection of attributes, identified by type, or an empty collection if there are no attributes. + + The type of the attributes. + When true, look up the hierarchy chain for the inherited custom attribute. + A collection of s, or an empty collection. + + + + Get and set values for a using reflection. + + + + + Initializes a new instance of the class. + + The member info. + + + + Sets the value. + + The target to set the value on. + The value to set on the target. + + + + Gets the value. + + The target to get the value from. + The value. + + + + A snake case naming strategy. + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + + + Initializes a new instance of the class. + + + A flag indicating whether dictionary keys should be processed. + + + A flag indicating whether explicitly specified property names should be processed, + e.g. a property name customized with a . + + + A flag indicating whether extension data names should be processed. + + + + + Initializes a new instance of the class. + + + + + Resolves the specified property name. + + The property name to resolve. + The resolved property name. + + + + Specifies how strings are escaped when writing JSON text. + + + + + Only control characters (e.g. newline) are escaped. + + + + + All non-ASCII and control characters (e.g. newline) are escaped. + + + + + HTML (<, >, &, ', ") and control characters (e.g. newline) are escaped. + + + + + Specifies what messages to output for the class. + + + + + Output no tracing and debugging messages. + + + + + Output error-handling messages. + + + + + Output warnings and error-handling messages. + + + + + Output informational messages, warnings, and error-handling messages. + + + + + Output all debugging and tracing messages. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the LoadWithPartialName method of the class is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The Load method of the class is used to load the assembly. + + + + + Specifies type name handling options for the . + + + should be used with caution when your application deserializes JSON from an external source. + Incoming types should be validated with a custom + when deserializing with a value other than . + + + + + Do not include the .NET type name when serializing types. + + + + + Include the .NET type name when serializing into a JSON object structure. + + + + + Include the .NET type name when serializing into a JSON array structure. + + + + + Always include the .NET type name when serializing. + + + + + Include the .NET type name when the type of the object being serialized is not the same as its declared type. + Note that this doesn't include the root serialized object by default. To include the root object's type name in JSON + you must specify a root type object with + or . + + + + + Determines whether the collection is null or empty. + + The collection. + + true if the collection is null or empty; otherwise, false. + + + + + Adds the elements of the specified collection to the specified generic . + + The list to add to. + The collection of elements to add. + + + + Converts the value to the specified type. If the value is unable to be converted, the + value is checked whether it assignable to the specified type. + + The value to convert. + The culture to use when converting. + The type to convert or cast the value to. + + The converted type. If conversion was unsuccessful, the initial value + is returned if assignable to the target type. + + + + + Exponents for both powers of 10 and 0.1 + + + + + Normalized powers of 10 + + + + + Normalized powers of 0.1 + + + + + Exponents for both powers of 10^16 and 0.1^16 + + + + + Normalized powers of 10^16 + + + + + Normalized powers of 0.1^16 + + + + + Packs *10^ as 64-bit floating point value according to IEEE 754 standard + + Sign + Mantissa + Exponent + + Adoption of native function NumberToDouble() from coreclr sources, + see https://github.com/dotnet/coreclr/blob/master/src/classlibnative/bcltype/number.cpp#L451 + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic that returns a result + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Helper method for generating a MetaObject which calls a + specific method on Dynamic, but uses one of the arguments for + the result. + + + + + Returns a Restrictions object which includes our current restrictions merged + with a restriction limiting our type + + + + + Gets a dictionary of the names and values of an type. + + + + + + Gets a dictionary of the names and values of an Enum type. + + The enum type to get names and values for. + + + + + List of primitive types which can be widened. + + + + + Widening masks for primitive types above. + Index of the value in this array defines a type we're widening, + while the bits in mask define types it can be widened to (including itself). + + For example, value at index 0 defines a bool type, and it only has bit 0 set, + i.e. bool values can be assigned only to bool. + + + + + Checks if value of primitive type can be + assigned to parameter of primitive type . + + Source primitive type. + Target primitive type. + true if source type can be widened to target type, false otherwise. + + + + Checks if a set of values with given can be used + to invoke a method with specified . + + Method parameters. + Argument types. + Try to pack extra arguments into the last parameter when it is marked up with . + true if method can be called with given arguments, false otherwise. + + + + Compares two sets of parameters to determine + which one suits better for given argument types. + + + + + Returns a best method overload for given argument . + + List of method candidates. + Argument types. + Best method overload, or null if none matched. + + + + Gets the type of the typed collection's items. + + The type. + The type of the typed collection's items. + + + + Gets the member's underlying type. + + The member. + The underlying type of the member. + + + + Determines whether the member is an indexed property. + + The member. + + true if the member is an indexed property; otherwise, false. + + + + + Determines whether the property is an indexed property. + + The property. + + true if the property is an indexed property; otherwise, false. + + + + + Gets the member's value on the object. + + The member. + The target object. + The member's value on the object. + + + + Sets the member's value on the target object. + + The member. + The target. + The value. + + + + Determines whether the specified MemberInfo can be read. + + The MemberInfo to determine whether can be read. + /// if set to true then allow the member to be gotten non-publicly. + + true if the specified MemberInfo can be read; otherwise, false. + + + + + Determines whether the specified MemberInfo can be set. + + The MemberInfo to determine whether can be set. + if set to true then allow the member to be set non-publicly. + if set to true then allow the member to be set if read-only. + + true if the specified MemberInfo can be set; otherwise, false. + + + + + Builds a string. Unlike this class lets you reuse its internal buffer. + + + + + Determines whether the string is all white space. Empty string will return false. + + The string to test whether it is all white space. + + true if the string is all white space; otherwise, false. + + + + + Specifies the state of the . + + + + + An exception has been thrown, which has left the in an invalid state. + You may call the method to put the in the Closed state. + Any other method calls result in an being thrown. + + + + + The method has been called. + + + + + An object is being written. + + + + + An array is being written. + + + + + A constructor is being written. + + + + + A property is being written. + + + + + A write method has not been called. + + + + + Indicates the method that will be used during deserialization for locating and loading assemblies. + + + + + In simple mode, the assembly used during deserialization need not match exactly the assembly used during serialization. Specifically, the version numbers need not match as the method is used to load the assembly. + + + + + In full mode, the assembly used during deserialization must match exactly the assembly used during serialization. The is used to load the assembly. + + + + diff --git a/packages/Newtonsoft.Json.10.0.1/tools/install.ps1 b/packages/Newtonsoft.Json.10.0.1/tools/install.ps1 new file mode 100644 index 0000000..0cebb5e --- /dev/null +++ b/packages/Newtonsoft.Json.10.0.1/tools/install.ps1 @@ -0,0 +1,116 @@ +param($installPath, $toolsPath, $package, $project) + +# open json.net splash page on package install +# don't open if json.net is installed as a dependency + +try +{ + $url = "http://www.newtonsoft.com/json/install?version=" + $package.Version + $dte2 = Get-Interface $dte ([EnvDTE80.DTE2]) + + if ($dte2.ActiveWindow.Caption -eq "Package Manager Console") + { + # user is installing from VS NuGet console + # get reference to the window, the console host and the input history + # show webpage if "install-package newtonsoft.json" was last input + + $consoleWindow = $(Get-VSComponentModel).GetService([NuGetConsole.IPowerConsoleWindow]) + + $props = $consoleWindow.GetType().GetProperties([System.Reflection.BindingFlags]::Instance -bor ` + [System.Reflection.BindingFlags]::NonPublic) + + $prop = $props | ? { $_.Name -eq "ActiveHostInfo" } | select -first 1 + if ($prop -eq $null) { return } + + $hostInfo = $prop.GetValue($consoleWindow) + if ($hostInfo -eq $null) { return } + + $history = $hostInfo.WpfConsole.InputHistory.History + + $lastCommand = $history | select -last 1 + + if ($lastCommand) + { + $lastCommand = $lastCommand.Trim().ToLower() + if ($lastCommand.StartsWith("install-package") -and $lastCommand.Contains("newtonsoft.json")) + { + $dte2.ItemOperations.Navigate($url) | Out-Null + } + } + } + else + { + # user is installing from VS NuGet dialog + # get reference to the window, then smart output console provider + # show webpage if messages in buffered console contains "installing...newtonsoft.json" in last operation + + $instanceField = [NuGet.Dialog.PackageManagerWindow].GetField("CurrentInstance", [System.Reflection.BindingFlags]::Static -bor ` + [System.Reflection.BindingFlags]::NonPublic) + + $consoleField = [NuGet.Dialog.PackageManagerWindow].GetField("_smartOutputConsoleProvider", [System.Reflection.BindingFlags]::Instance -bor ` + [System.Reflection.BindingFlags]::NonPublic) + + if ($instanceField -eq $null -or $consoleField -eq $null) { return } + + $instance = $instanceField.GetValue($null) + + if ($instance -eq $null) { return } + + $consoleProvider = $consoleField.GetValue($instance) + if ($consoleProvider -eq $null) { return } + + $console = $consoleProvider.CreateOutputConsole($false) + + $messagesField = $console.GetType().GetField("_messages", [System.Reflection.BindingFlags]::Instance -bor ` + [System.Reflection.BindingFlags]::NonPublic) + if ($messagesField -eq $null) { return } + + $messages = $messagesField.GetValue($console) + if ($messages -eq $null) { return } + + $operations = $messages -split "==============================" + + $lastOperation = $operations | select -last 1 + + if ($lastOperation) + { + $lastOperation = $lastOperation.ToLower() + + $lines = $lastOperation -split "`r`n" + + $installMatch = $lines | ? { $_.StartsWith("------- installing...newtonsoft.json ") } | select -first 1 + + if ($installMatch) + { + $dte2.ItemOperations.Navigate($url) | Out-Null + } + } + } +} +catch +{ + try + { + $pmPane = $dte2.ToolWindows.OutputWindow.OutputWindowPanes.Item("Package Manager") + + $selection = $pmPane.TextDocument.Selection + $selection.StartOfDocument($false) + $selection.EndOfDocument($true) + + if ($selection.Text.StartsWith("Attempting to gather dependencies information for package 'Newtonsoft.Json." + $package.Version + "'")) + { + # don't show on upgrade + if (!$selection.Text.Contains("Removed package")) + { + $dte2.ItemOperations.Navigate($url) | Out-Null + } + } + } + catch + { + # stop potential errors from bubbling up + # worst case the splash page won't open + } +} + +# still yolo \ No newline at end of file diff --git a/packages/Sustainsys.Saml2.2.11.0/.signature.p7s b/packages/Sustainsys.Saml2.2.11.0/.signature.p7s new file mode 100644 index 0000000..58b9044 Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/.signature.p7s differ diff --git a/packages/Sustainsys.Saml2.2.11.0/Sustainsys.Saml2.2.11.0.nupkg b/packages/Sustainsys.Saml2.2.11.0/Sustainsys.Saml2.2.11.0.nupkg new file mode 100644 index 0000000..d3c9dca Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/Sustainsys.Saml2.2.11.0.nupkg differ diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.dll b/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.dll new file mode 100644 index 0000000..b229443 Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.dll differ diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.xml b/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.xml new file mode 100644 index 0000000..0fdd449 --- /dev/null +++ b/packages/Sustainsys.Saml2.2.11.0/lib/net461/Sustainsys.Saml2.xml @@ -0,0 +1,4509 @@ + + + + Sustainsys.Saml2 + + + + + Is this certificate for current or future use? + + + + + The certificate is used for current requests + + + + + The certificate is used for current and/or future requests + + + + + How is the certificate used? + + + + + The certificate is used for either signing or encryption, or both. + Equivalent to Signing | Encryption. + + + + + The certificate is used for signing outbound requests + + + + + The certificate is used for decrypting inbound assertions + + + + + The certificate is used as a Tls Client certificate for outbound + tls requests. + + + + + Extension methods for claims. + + + + + Create a Saml2NameIdentifier from a claim. + + Name identifier or Saml2 logout info claim. + Saml2NameIdentifier + The field order is:NameQualifier,SPNameQualifier,Format,SPProvidedID,Value + + + + Extension methods for Claims Identities + + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + In response to id + The destination Uri for the message + Saml2Assertion + + + + + Create a Saml2NameIdentifier from the identity. + + Identity to get NameIdentifier claim from. + Saml2NameIdentifier + + + + Config collection of ArtifactResolutionElements. + + + + + Factory for element type. + + + + + + Get an identifying key of the element. + + Element + Index of endpoint + + + + Generic enumerator. + + Generic enumerator + + + + Configuration of an artifact resolution service endpoint on an idp. + + + + + Index of the artifact resolution service endpoint. + + + + + Location of the endpoint. + + + + + Collection of certificate elements. + + + + + Create a new element of the right type. + + A new certificate element + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Config element for the signing certificate. + + + + + Allows local modification of the configuration for testing purposes + + + + + + File name of cert stored in file. + + + + + Store name to search. + + + + + Store location to search. + + + + + The search term used for searching the certificate store. + + + + + Find type, what field to search. + + + + + Load the certificate pointed to by this configuration. + + Certificate + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Ctor + + + + + Ctor + + Config element to load + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Honor the owin authentication mode even on logout. Normally the logout + handling is always done as if the middleware was active, to allow for + simple sign out without specifying an auth type. + + + + + Do not read the AuthnContext element in Saml2Response. + If you do not need these values to be present as claims in the generated + identity, using this option can prevent XML format errors (IDX13102) + e.g. when value cannot parse as absolute URI + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Handling logout requires access to the authenticated user session. If logout + is done over the POST binding, the session cookie must have SameSite=None + set (which is probably a bad idea). To avoid problems, disable logout + over POST in metadata by default. + + + + + SAML2 Specs says in section 4.4.4.2: + "... The responder MUST authenticate itself to the requester and ensure message integrity, either by signing the message or using a binding-specific mechanism." + + Unfortunately not all IDP seem to follow the specification. Disables requirement for a signed LogoutResponse. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Collection of items with two sources: configured and loaded dyanically. + The dynamically loaded can reset while the configured are kept. + metadata. + + + + + Add a configured key. + + Key to add. + + + + Add a configured certificate. + + Certificate to add. + + + + Set the complete set of loaded items keys. Previously loaded items + are cleared, configured items remain. + + Items to set + + + + The loaded items. + + + + + Gets an enumerator to the combined set of keys. + + Enumerator + + + + Contact person for a SAML2 entity. + + + + + The type of this contact. A value from the + System.IdentityModel.Metadata.ContactType enumeration. + + + + + Name of the company of the contact. + + + + + Given name of the contact. + + + + + Surname of the contact. + + + + + Phone number of the contact. + + + + + E-mail of the contact. + + + + + Config collection of contacts. + + + + + Create a new element of the right type. + + A new ContactPersonElement. + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Converts between string and EntityId, used by the configuration system to + allow configuration properties of type EntityId. + + + + + Converts a string to an EntityId + + Ignored + Ignored + String to convert + EntityID + + + + Config collection of federations. + + + + + Create new elemnt of the right type. + + FederationElement + + + + Get the key of an element, which is the metadata url. + + FedertionElement + + + + + Generic IEnumerable implementation. + + Enumerator + + + + Registers the identity providers from the configured federations in the identity provider dictionary. + + Current options. + + + + Configuration of a federation. + + + + + Location (url, local path or app relative path such as ~/App_Data) + where metadata is located. + + + + + Are unsolicited responses from the idps in the federation allowed? + + + + + Signing certificates for the federation + + + + + Config collection of IdentityProviderElements. + + + + + Create new element of right type. + + IdentityProviderElement + + + + Get the name of an element. + + IdentityProviderElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured identity providers in the dictionary of active idps. + + Current options. + + + + A thread safe wrapper around a dictionary for the identity providers. + + + First I thought about using a ConcurrentDictionary, but that does not maintain + any order of the added objects. Since the first idp added becomes the default idp, + the order must be preserved. And there has to be queuing semantics if the first idp + is dynamically loaded from a federation and later removed. Locks are simple and + this part of the code shouldn't be that performance sensitive. + + + + + Gets an idp from the entity id. + + entity Id to look up. + IdentityProvider + + + + Add an identity provider to the collection.. + + Identity provider to add. + + + + The default identity provider; i.e. the first registered of the currently known. + + + + + Gets all currently known identity providers. Note that the returned + enumeration is a copy to avoid race conditions. + + + + + Try to get the value of an idp with a given entity id. + + Entity id to search for. + The idp, if found. + True if an idp with the given entity id was found. + + + + Checks if there are no known identity providers. + + + + + Removes the idp with the given entity id, if present. If no such + entity is found, nothing is done. + + EntityId of idp to remove. + + + + Config element for the identity provider element. + + + + + Allows local modification of the configuration for testing purposes + + + + + + EntityId as presented by the idp. Used as key to configuration. + + + + + Destination url to send sign in requests to. + + + + + Single logout url endpoint of Idp. + + + + + The binding to use when sending requests to the Idp. + + + + + Certificate location for the certificate the Idp uses to sign its messages. + + + + + Signing algorithm for outbound messages to this Idp. Overrides the + main signature algorithm configured in . + + + + + Allow unsolicited responses. That is InResponseTo is missing in the AuthnRequest. + If true InResponseTo is not required. + If false InResponseTo is required. + Even though AllowUnsolicitedAuthnResponse is true the InResponseTo must be valid if existing. + + + + + Enable automatic downloading of metadata form the well-known uri (i.e. interpret + the EntityID as an uri and download metadata from it). + + + + + Metadata location url to be used for automatic downloading of metadata. + + + + + Artifact Resolution endpoints for the identity provider. + + + + + Does this Idp want the AuthnRequests to be signed? + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Indicates that the IDP sends the return url as part of the RelayState. + This is used when is enabled. + + + + + Root interface for the options objects, handling all configuration of + Saml2. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp list and the notifications. + + + + + Information about known identity providers. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Metadata configuration. + + + + + Used by tests to write-enable config. + + + + + Is the element contents read only? Always true in production, but + can be changed during tests. + + Is the element contents read only? + + + + Information about organization. + + + + + Optional attribute that describes for how long anyone may cache the metadata + presented by the service provider. Defaults to 1 hour. + + + + + How long after generation should the metadata be valid? + + + + + Collection of contacts. + + + + + Requested attributes of the service provider. + + + + + Metadata flag that we want assertions to be signed. + + + + + NamedId policy configuration element. + + + + + Allow create. + + + + + The NameId format. + + + + + Options implementation for handling in memory options. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Reads the options from the current config file. + + Options object. + + + + Creates an options object with the specified SPOptions. + + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Available identity providers. + + + + + Information about the organization responsible for the entity. + + + + + Is this section readonly? + + Is this section readonly? + + + + Name of the organization. + + + + + Display name of the organization. + + + + + Url of the organization. + + + + + The language that should be used for the organization strings. + + + + + Config for a requested element in the SPs metadata. + + + + + Name of the attribute. Usually on the form urn:oid:.... + + + + + Friendly, human readable name of the attribute. + + + + + Format of the Name property, one of the standard Uris in the saml specification. + + + + + Is this attribute required by the SP for it to work correctly? + + + + + Collection of requested attributes that an SP wants in incoming assertions. + + + + + Create a new element of the right type. + + A new RequestedAttributeElement + + + + Get the key of an element. + + Element to get key of. + The name of the requested attribute. + + + + Get a generic enumerator to the collection. + + Generic enumerator + + + + Configuration of RequestedAuthnContext in generated AuthnRequests. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + AuthnContextClassRef. Either a full URL or the last word of a + standard URL. + + + + + Comparison mode of AuthnContextClassRef + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Notification called when a + has been created. The authenticationrequest can be amended and + modified. + + + + + Notification called when the SignIn command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the SignIn command is about to select + what Idp to use for the request. The EntityId is the one supplied + (e.g. through query string). To select a specicic IdentityProvider + simply return it. Return null to fall back to built + in selection. + + + + + Notification called to decide if a SameSite=None attribute should + be set for a cookie. The default implementation is based on the pseudo + code in https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/ + More covering code can be found at + https://www.chromium.org/updates/same-site/incompatible-clients but that cannot + be shipped with the library due to the license. + + + + + Notification called when the logout command is about to use the + StoredRequestState derived from the request's RelayState data. + Return a different StoredRequestState if you would like to customize the + RelayState lookup. + + + + + Notification called when a command is about to construct a fully-qualified url + Return a non-null Uri if you need to override this per request. Otherwise + it will fall back to the normal logic that checks the request Uri + and the SPOptions.PublicOrigin setting + + + + + Notification called when single logout status is returned from IDP. + Return true to indicate that your notification has handled this status. Otherwise + it will fall back to the normal status processing logic. + + + + + Get a binding that can unbind data from the supplied request. The + default is to use + + + + + Notification called when the command has extracted data from + request (by using ) + + + + + Notification called when the ACS command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the Logout command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when a logout request is created to initiate single log + out with an identity provider. + + + + + Notification called when a logout request has been transformed to an XML node tree. + + + + + Notification called when a logout request has been received and processed and a Logout Response has been created. + + + + + Notification called when metadata has been created, but before + signing. At this point the contents of the metadata can be + altered before presented. + + + + + Notification called when the Metadata command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called by the SignIn and Logout commands to validate a ReturnUrl that is not relative. + Return true to indicate that you accept the ReturnUrl, false otherwise. + Default validation do not accept any absolute URL. + When false is returned, the SignIn and Logout commands will throw an . + + + + + Notification called when getting an identity provider. Default version is to return + the given idp from Options.IdentityProviders. + + + + + Callbacks that allow modifying the validation behavior in potentially unsafe/insecure ways + + + + + Callbacks that allow modification of validation behavior in potentially unsafe/insecure ways + + + + + Notification called when the token handler has populated the + . Modify it's properties to customize + the generated validation parameters. + + + + + Notification called when an incoming Saml Response contains an unexpected + InResponseTo value. Return true to acceppt the message despite this. + + This notification has been added to aid in troubleshooting a + hard-to-track-down issue. It will be removed in a future release if a + better solution is identified thanks to the added production analysis + that this enables. + + + + Certificates used by the service provider for signing, decryption and + TLS client certificates for artifact resolve. + + + + + Add a certificate to the collection with default status use and + metadata behaviour. + + Certificate to add. + + + + Add to the collection at the specified position. + + Position index. + Service certificate to add. + + + + Config element for the service certificate element. + + + + + Is this certificate for current or future use? + + + + + Intended use of the certificate + + + + + How should we override the metadata publishing rules? + + + + + Config collection of ServiceCertificateElements. + + + + + Create new element of right type. + + ServiceCertificateElement + + + + Get the name of an element. + + ServiceCertificateElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured service certificates. + + Current options. + + + + Signing behavior for requests. + + + + + Sign authnrequests if the idp is configured for it. This is the + default behavior. + + + + + Always sign AuthnRequests. AuthnRequestsSigned is set to true + in metadata. + + + + + Never sign AuthnRequests. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Ctor + + + + + Construct the options from the given configuration section + + + + + + Return Uri to redirect the client to, if no return uri was specified + when initiating the signin sequence. + + + + + Recommendation of cache refresh interval to those who reads our + metadata. + + + + + Maximum validity duration after fetch for those who reads our + metadata. Exposed as an absolute validUntil time in the metadata. + If set to null, no validUntil is exposed in metadata. + + + + + The security token handler used to process incoming assertions for this SP. + The default value is to lazy create one using the current EntityId. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + Application root relative path for Saml2 endpoints. The + default is "/Saml2". + + + + + By default, the service provider uses the host, protocol, port and + application root path from the HTTP request when creating links. + This might not be accurate in reverse proxy or load-balancing + situations. You can override the origin used for link generation + for the entire application using this property. To override per request, + implement a GetPublicOrigin Notification function. + + + + + Metadata describing the organization responsible for the entity. + + + + + NameId Policy. + + + + + RequestedAuthnContext + + + + + Collection of contacts for the SAML2 entity. + + + + + Collection of attribute consuming services for the service provider. + + + + + Certificates used by the service provider for signing or decryption. + + + + + Certificates valid for use in decryption + + + + + Certificate for use in signing outbound requests + + + + + Certificates to be published in metadata + + + + + Signing behaviour for AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Metadata flag that we want assertions to be signed. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Minimum accepted signature algorithm for any incoming messages. + + + + + Adapter to logging framework of hosting application. + + + + + Template for token validation parameters. Some security critical validation + parameters are set for each use. The Unsafe.TokenValidationParametersCreated notification + is called after those are set if those need to be overriden. + + + + + Config section for the module. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + Current config as read from app/web.config. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + The Url to redirect back to after successfull authentication. + + + + + By default, the service provider uses the host, protocol, and port + from the HTTP request when creating links. This might not be + accurate in reverse proxy or load-balancing situations. You can + override the origin used for link generation using this property. + + + + + Set of identity providers known to the service provider. + + + + + Set of federations. The service provider will trust all the idps in these federations. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + Application root relative path for Saml2 endpoints. The + default is "Saml2". + + + + + NamedId policy element. + + + + + RequestedAuthnContext config. + + + + + Metadata describing the organization responsible for the entity. + + + + + Metadata of the service provider. + + + + + Contacts for the SAML2 entity. + + + + + Attribute consuming services. + + + + + Certificates used by the service provider for signing and/or decryption. + + + + + Signing behavior for created AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Weakest accepted signing algorithm for inbound messages. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Helper methods for DateTime formatting. + + + + + Format a datetime for inclusion in SAML messages. + + Datetime to format. + Formatted value. + + + + A SAML response was found, but could not be parsed due to formatting issues. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Exception thrown when an signature is not valid according to the + SAML standard. + + + + + Default ctor + + + + + Ctor + + Message of exception + + + + Ctor + + Message + Inner exception + + + + Serialization Ctor + + Serialization info + Serialization context + + + + No saml response was found in the http request. + + + + + Default Ctor, setting message to a default. + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Base class for authentication services specific exceptions, that might + require special handling for error reporting to the user. + + + + + Default Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed validation. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed InResponseTo validation because RelayState is lost, or an unsolicited response contains an InResponseTo + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Extended exception containing information about the status and status message SAML response. + + + + + Status of the SAML2Response + + + + + Status message of SAML2Response + + + + + Second level status of SAML2Response + + + + + Ctor, bundling the Saml2 status codes and message into the exception message. + + Exception message. + Status of the SAML2Response + Status message of SAML2Response + Second level status of SAML2Response + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Represents a federation known to this service provider. + + + + + Ctor + + Config to use to initialize the federation. + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + For how long is the metadata that the federation has loaded valid? + Null if there is no limit. + + + + + Signing keys to use to verify the metadata before using it. + + + + + Permitted cache duration for the metadata. + + + + + Valid until + + + + + Represents a known identity provider that this service provider can communicate with. + + + + + Ctor + + Entity id of the identityprovider. + Service provider options to use when + creating AuthnRequests for this Idp. + + + + Should this idp load metadata? The metadata is loaded immediately + when the property is set to true, so the + must be correct before settingLoadMetadata to true. + + + + The binding used when sending AuthnRequests to the identity provider. + + + + + The Url of the single sign on service. This is where the browser is redirected or + where the post data is sent to when sending an AuthnRequest to the idp. + + + + + Artifact resolution endpoints on the idp. + + + + + The Url of the single sign out service. This is where the browser + is redirected or where the post data is sent to when sending a + LogoutRequest to the idp. + + + + + The Url to send single logout responses to. Defaults to + SingleLogoutServiceUrl. + + + + + Binding for the Single logout service. If not set, returns the + same as the main binding (used for AuthnRequests) + + + + + The Entity Id of the identity provider. + + + + + Is this idp allowed to send unsolicited responses, i.e. idp initiated sign in? + + + + + Does the RelayState contains the return url?, + This setting is used only when the AllowUnsolicitedAuthnResponse setting is enabled. + + + + + Location of metadata for the Identity Provider. Automatically enables + . The location can be a URL, an absolute + path to a local file or an app relative path + (e.g. ~/App_Data/IdpMetadata.xml). By default the entity id is + interpreted as the metadata location (which is a convention). + + + + + Create an authenticate request aimed for this idp. + + Urls for Saml2, used to populate fields + in the created AuthnRequest + + + + Signing Algorithm to be used when signing oubound messages. + + + + + Bind a Saml2 message using the active binding of the idp, + producing a CommandResult with the result of the binding. + + + This overload does not support the usage of Xml Created notifications. + + The Saml2 message to bind. + CommandResult with the bound request. + + + + Bind a Saml2 message using the active binding of hte idp, + producing a CommandResult with the result of the binding. + + Type of the message. + The Saml2 message to bind. + Notification to call with Xml structure + CommandResult with the bound message. + + + + The public key of the idp that is used to verify signatures of responses/assertions. + + + + + Reads the supplied metadata and sets all properties of the + IdentityProvider based on the metadata. + + Metadata to read. + + + + Validity time of the metadata this idp was configured from. Null if + idp was not configured from metadata. + + + + + Does this Idp want the AuthnRequests signed? + + + + + Create a logout request to the idp, for the current identity. + + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Interface for an adapter around the logging framework used on each + platform. + + + + + Write informational message. + + Message to write. + + + + Write an error message + + Message + Exception to include in error message. + + + + Write an informational message on the verbose level. + + Message to write + + + + SymmetricAlgorithm decrypting implementation for http://www.w3.org/2009/xmlenc11#aes128-gcm. + This is class is not a general implementation and can only do decryption. + + + + + A WebClient implementation that will add a list of client + certificates to the requests it makes. + + + + + Register the certificate to be used for this requets. + + Certificates to offer to server + + + + Override the base class to add the certificate + to the reuqest before returning it. + + + + + + + Helpers for delimited string, with support for escaping the delimiter + character. + + + + + Join strings with a delimiter and escape any occurence of the + delimiter and the escape character in the string. + + Strings to join + Joined string + + + + Split strings delimited strings, respecting if the delimiter + characters is escaped. + + Joined string from + Unescaped, split strings + + + + Class to help with mapping virtual paths relative to the server. + + + + + Returns the base path of the website or application running. + + + + + Maps a virtual path to the BasePath of the running appliction. + + The virtual path that needs to mapped relative to the server. + A file path. + + + + Determines if a virtual path is relative or not. + + The path that is to be tested. + True if the path is relative otherwise false. + + + + Determines if a url is relative to current host, excluding protocol-relative addresses + + The path that is to be tested. + True if the url is relative otherwise false. + + + + Class implements static methods to help parse a query string. + + + + + Splits a query string into its key/value pairs. + + A query string, with or without the leading '?' character. + A collecktion with the parsed keys and values. + + + + AES-GCM Nonce size defined in https://www.w3.org/TR/xmlenc-core1/#sec-AES-GCM + + + + + Crypto description for a Managed implementation of SHA256 signatures. + + + + + Ctor + + + + + Create a deformatter + + Key + Deformatter + + + + Create a formatter + + Key + Formatter + + + + How should we override the metadata publishing rules + + + + + No override. Published according to the normal rules. + + + + + Publish as Unspecified + + + + + Publish as Encryption + + + + + Publish as Signing + + + + + Do not publish + + + + + Metadata for an attribute consuming service. + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Is the service required? + + + + + The name of the attribute consuming service. + + + + + Description of the attribute consuming service + + + + + Requested attributes. + + + + + Use this instance for reading metadata. It uses custom extensions + to increase feature support when reading metadata. + + + + + An indexed entry with an optional default + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + A collection of indexed entries with support for getting the + configured default entry + + The type stored in the collection + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Extensions for Metadatabase. + + + + + Use a MetadataSerializer to create an XML string out of metadata. + + Metadata to serialize. + Certificate to sign the metadata + with. Supply null to not sign. + Algorithm to use when signing. + + + + Helper for loading SAML2 metadata + + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + EntityDescriptor containing metadata + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + If the metadata contains + an EntitiesDescriptor, try to unpack it and return a single + EntityDescriptor inside if there is one. + EntityDescriptor containing metadata + + + + Load and parse metadata for a federation. + + Url to metadata + Extended entitiesdescriptor + + + + Load and parse metadata for a federation. + + Url to metadata + + Validate the certificate when doing + signature validation. Normally a bad idea with SAML2 as certificates + are not required to be valid but are only used as conventient carriers + for keys. + Mininum strength accepted + for signing algorithm. + Extended entitiesdescriptor + + + + Specifies an attribute requested by the service provider. + + + + + Ctor + + Name of the attribute. + + + + Ctor + + Name of the attribute. + Value of the attribute. + + + + Is this attribute required by the service provider? + + + + + Uri used for NameFormat to specify that the Name is a Uri. + + + + + Uri used for NameFormat to specify that the format of the Name + is unspecified. + + + + + Uri used for NameFormat to specify that the format of the Name + fulfills the standard's basic requirements. + + + + + Extensions for NameIdFormat enum. + + + + + Get the full Uri for a NameIdFormat. + + NameIdFormat to get Uri for + Uri + + + + Logger adapter that does nothing. + + + + + Write an error message + + Message + Exception to include in error message. + + + + Write informational message. + + Message to write. + + + + Write an informational message on the verbose level. + + Message to write + + + + Generator of secure random keys.. + + + + + Create a unique random string with a cryptographically secure + random function. + + Random string 56-chars string + + + + Create a unique random array with a cryptographically secure + random function. + + 20 random bytes. + + + + Simple default implementation of detection of browsers/devices not compatible with + the SameSite=None cookie attribute. + Based on https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1 + + + + + Should a SameSite=None cookie attribute be emitted? + + User Agent string + True if SameSite=None should be emitted. + + + + Extension methods for Saml2Assertion + + + + + Writes out the assertion as an XElement. + + The assertion to create xml for. + XElement + + + + Claim type constants. + + + + + Session index is set by the idp and is used to correlate sessions + during single logout. + + + + + Original subject name identifier from the SAML2 idp, that should + be logged out as part of a single logout scenario. + + + + + Extension methods for Saml2Condition + + + + + Writes out the conditions as an XElement. + + Conditions to create xml for. + XElement + + + + Extension methods for Saml2NameId + + + + + Create XElement for the Saml2NameIdentifier. + + + + + + + SAML2 namespace constants. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace Uri of Saml2 protocol. + + + + + Namespace of SAML2 assertions. + + + + + Namespace of SAML2 assertions. + + + + + Namespace Uri of SAML2 assertions. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for Xml schema instance. + + + + + Namespace for Soap envelope. + + + + + Namespace for Soap envelope. + + + + + Comparison setting for RequestedAuthnContext, see SAML2 Core spec 3.3.2.2.1. + + + + + Exact match is required. This is the default. + + + + + The resulting AuthnContext must be at least as strong as the + specified classRef. + + + + + The resulting AuthnContext must be at most as strong as the + specified classRef. + + + + + The resulting AuthnContext must be better than the specified + classRef. The classRef specified is thus not permitted. + + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Common properties of all Saml2 message implementations (both requests + and responses). There is no corresponding definition in the SAML2 + standard, so this is made up of the common fields of 3.2.2 Complex Type + StatusResponseType (the base type for all responses) and of 3.2.1 Complex + Type RequestAbstractType. + + + + + The destination of the message. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Issuer of the message. + + + + + Serializes the message into wellformed XML. + + Saml2 message to transform to XML + Notification allowing modification of XML tree before serialization. + string containing the Xml data. + + + + The NameId Format. + + + + + No NameId format has been configured. No format will be included + in AuthnRequests and metadata. + + + + + 8.3.1 Unspecified + + + + + 8.3.2 Email Address + + + + + 8.3.3 X.509 Subject Name + + + + + 8.3.4 Windows Domain Qualified Name + + + + + 8.3.5 Kerberos Principal Name + + + + + 8.3.6 Entity Identifier + + + + + 8.3.7 Persistent Identifier + + + + + 8.3.8 Transient Identifier + + + + + Artifact resolution request, corresponds to section 3.5.1 in SAML + core specification. + + + + + Artifact to resolve. + + + + + The SAML2 request name + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 ArtifactResponse message as specified in SAML2 Core 3.5.2. + + + + + Ctor + + Parsed XML with message. + + + + Contained message. + + + + + Status code of the Artifact response. + + + + + An authentication request corresponding to section 3.4.1 in SAML Core specification. + + + + + Default constructor + + + + + The SAML2 request name + + + + + Serializes the request to a Xml message. + + XElement + + + + Serializes the message into wellformed Xml + + string containing the Xml data. + + + + Read the supplied Xml and parse it into a authenticationrequest. + + xml data. + Relay State attached to the message or null if not present. + Saml2Request + On xml errors or unexpected xml structure. + + + + Ctor + + Xml data + RelayState associateed with the message. + + + + The assertion consumer url that the idp should send its response back to. + + + + + Index to the SP metadata where the list of requested attributes is found. + + + + + Scoping for request + + + + + NameId policy. + + + + + RequestedAuthnContext. + + + + + Binding type to request the Idp to use when responding. + + + + + Sets whether request should force the idp to authenticate the presenter directly, + rather than rely on a previous security context. + If false, the ForceAuthn parameter is omitted from the request. + If true, the request is sent with ForceAuthn="true". + + + + + Sets whether request should request for SAML Passive login if possible, + If false, the IsPassive parameter is omitted from the request. + If true, the request is sent with IsPassive="true". + + + + + The Saml2IdPEntry specifies a single identity provider trusted by the + requester to authenticate the presenter + + + + + Initializes a new instance of the class. + + The provider identifier. + + + + A URI reference representing the location of a profile-specific + endpoint supporting the authentication request protocol. The + binding to be used must be understood from the profile of use. + + + + + A human-readable name for the identity provider. + + + + + The Entity Id of the Identity Provider. Cannot be null. + + + + + Create XElement for the Saml2IdPEntry. + + + + + A Saml2 LogoutRequest message (SAML core spec 3.7.1) + + + + + Ctor + + + + + Ctor + + Id of message. + + + + Create Saml2LogoutRequest from data in Xml. + + Xml data to initialize the Saml2LogoutRequest from. + + + + The SAML2 request name + + + + + Name id to logout. + + + + + Session index to logout. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 Logout Response. + + + + + Ctor + + Status of the response. + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Appends xml for the Saml2LogoutResponse to the given parent node. + + Xml for the Saml2LogoutResponse is appended + to the children of this node. + + + + Load values into Saml2LogoutResponse from passed xml element + + XmlElement containing a LogoutResponse + Saml2LogoutResponse + + + + The NameId policy. + + The class is used in created AuthnRequests, so it is + immutable to avoid unintended changes. + + + + Ctor + + + + + + + Value of AllowCreate attribute. Set to null to omit. + + + + + The NameId format. + + + + + Somewhat ugly subclassing to be able to access some methods that are protected + on Saml2SecurityTokenHandler. The public interface of Saml2SecurityTokenHandler + expects the actual assertion to be signed, which is not always the case when + using Saml2-P. The assertion can be embedded in a signed response. Or the signing + could be handled at transport level. + + + + + Process authentication statement from SAML assertion. WIF chokes if the authentication statement + contains a DeclarationReference, so we clear this out before calling the base method + http://referencesource.microsoft.com/#System.IdentityModel/System/IdentityModel/Tokens/Saml2SecurityTokenHandler.cs,1970 + + Authentication statement + Claim subject + Assertion Issuer + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Base class for saml requests, corresponds to section 3.2.1 in SAML Core specification. + + + + + The id of the request. + + + + + Version of the SAML request. Always returns "2.0" + + + + + The instant that the request was issued (well actually, created). + + + + + SAML message name for requests - hard coded to SAMLRequest. + + + + + The destination of the request. + + + + + The issuer of the request. + + + + + The additional content to append within an Extensions element. + + + + + The SAML2 request name + + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Creates XNodes for the fields of the Saml2RequestBase class. These + nodes should be added when creating XML out of derived classes. + + + + + + Reads the request properties present in Saml2RequestBase + Also validates basic properties of the request + + The xml document to parse + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + RelayState attached to the message. + + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Configuration of RequestedAuthnContext + + + + + Ctor + + Config element to load. + + + + Ctor + + AuthnContextClassRef + Comparison + + + + Authentication context class reference. + + + + + Comparison method. + + + + + Represents a SAML2 response according to 3.3.3. The class is immutable (to an + external observer. Internal state is lazy initiated). + + + + Holds all assertion element nodes + + + + Read the supplied Xml and parse it into a response. + + xml data. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + Saml2Response + On xml errors or unexpected xml structure. + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + Audience of the response, set as AudienceRestriction + response. Each identity is translated into a separate assertion. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + The response as an xml element. Either the original xml, or xml that is + generated from supplied data. + + + + + Transforms the message to an XElement object tree. + + This operation is inefficient, but it is only used by + the StubIdp so it's acceptable. + XElement with Xml representation of the message + + + + SAML Message name for responses, hard coded to SAMLResponse. + + + + + string representation of the Saml2Response serialized to xml. + + string containing xml. + + + + Id of the response message. + + + + + Expected InResponseTo as extracted from + + + + + InResponseTo id. + + + + + Issue instant of the response message. + + + + + Status code of the message according to the SAML2 spec section 3.2.2.2 + + + + + StatusMessage of the message according to the SAML2 spec section 3.2.2.1 + + + + + Optional status which MAY give additional information about the cause of the problem (according to the SAML2 spec section 3.2.2.2))))))))). + Because it may change in future specifications let's not make enum out of it yet. + + + + + Issuer (= sender) of the response. + + + + + The destination of the response message. + + + + Gets all assertion element nodes from this response message. + All assertion element nodes. + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + ClaimsIdentities + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + Relay data stored when creating AuthnRequest, to be passed on to + GetIdentityProvider notification. + ClaimsIdentities + + + + RelayState attached to the message. + + + + + Session termination time for a session generated from this + response. + + + + + Saml2Scoping specifies a set of identity providers trusted by the + requester to authenticate the presenter, as well as limitations and + context related to proxying of the authentication request message to + subsequent identity providers by the responder. + + + + + Gets advisory list of identity providers and associated information + that the requester deems acceptable to respond to the request. + + + + + Fluent config helper that adds a to the + + + Idp entry to add + this + + + + Specifies the number of proxying indirections permissible between + the identity provider that receives the authentication request and + the identity provider who ultimately authenticates the principal. + A count of zero permits no proxying, while omitting (null) this + attribute expresses no such restriction. + + + + + Gets or sets the set of requesting entities on whose behalf the + requester is acting. Used to communicate the chain of requesters + when proxying occurs. + + + + + Fluent config helper that adds a requester id to the + + + Requester Id to add + this + + + + Create XElement for the Saml2Scoping. + + + + + Saml2 Soap binding implementation. + + + This class does not follow the pattern of the other three bindings + (Redirect, POST and Artifact) because it does not use the front channel + with messages being passed over the user's browser. + + + + + Create a SOAP body around a specified payload. + + Payload of the message. + + + + + Extract the body of a SOAP message. + + xml data + Parsed data. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Response. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Client certificates to offer to the server. + Response. + + + + Status codes, mapped against states in section 3.2.2.2 in the SAML2 spec. + + + + + Success. + + + + + Error because of the requester. + + + + + Error because of the responder. + + + + + Versions doesn't match. + + + + + The responding provider was unable to successfully authenticate the principal + + + + + Unexpected or invalid content was encountered within a saml:Attribute or saml:AttributeValue element. + + + + + The responding provider cannot or will not support the requested name identifier policy. + + + + + The specified authentication context requirements cannot be met by the responder. + + + + + Used by an intermediary to indicate that none of the supported identity provider Loc elements in + an IDPList can be resolved or that none of the supported identity providers are available. + + + + + Indicates the responding provider cannot authenticate the principal passively, as has been requested. + + + + + Used by an intermediary to indicate that none of the identity providers in an IDPList are supported by the intermediary. + + + + + Used by a session authority to indicate to a session participant that it was not able to propagate logout to all other session participants. + + + + + Indicates that a responding provider cannot authenticate the principal directly and is not permitted to proxy the request further. + + + + + The SAML responder or SAML authority is able to process the request but has chosen not to + respond. This status code MAY be used when there is concern about the security context of the + request message or the sequence of request messages received from a particular requester. + + + + + The SAML responder or SAML authority does not support the request. + + + + + The SAML responder cannot process any requests with the protocol version specified in the request. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is a major upgrade from the highest protocol version supported by the responder. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is too low. + + + + + The resource value provided in the request message is invalid or unrecognized. + + + + + The response message would contain more elements than the SAML responder is able to return. + + + + + An entity that has no knowledge of a particular attribute profile has been presented with an attribute + drawn from that profile. + + + + + The responding provider does not recognize the principal specified or implied by the request. + + + + + The SAML responder cannot properly fulfill the request using the protocol binding specified in the + request. + + + + + Abstract Saml2 StatusResponseType class. + + + + + Ctor + + Status of the response + + + + The destination of the message. + + + + + Issuer of the message. + + + + + Id of request message, if this message is a response to a previous + request. + + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Status code of the message. + + + + + Id of the message. + + + + + Issue instant. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Extension methods for Saml2Statement + + + + + Writes out the statement as an XElement. + + Statement to create xml for. + XElement + + + + Extension methods for Saml2Subject + + + + + Writes out the subject as an XElement. + + The subject to create xml for. + XElement + + + + Writes out the subject confirmation as an XElement. + + + + + + + + Writes out the subject confirmation data as an XElement. + + + + + + + + Service Certificate definition + + + + + Ctor + + + + + Ctor for loading from configuration + + + + + + X509 Certificate + + + + + Is this certificate for current or future use? + + + + + What is the intended use of this certificate. + + + + + How should we override the metadata publishing rules? + + + + + Stored data for pending requests. + + + + + Start of the cookie name for state preservation. + + + + + Ctor + + The EntityId of the IDP the request was sent to + The Url to redirect back to after a succesful login + ID of the SAML message, used to match InResponseTo + Aux data that can be stored across the authentication request. + + + + The IDP the request was sent to + + + + + The Url to redirect back to after a succesful login + + + + + Message id of the originating Saml message. Should match InResponseTo + in the response. + + + + + Aux data that need to be preserved across the authentication call. + + + + + Get a serialized representation of the data. + + Serialized data + + + + Ctor that restores a StoredRequestState object from serialized + representation. + + data buffer + + + + The level of trust that a certain piece of data comes with. + + + + + The data cannot be trusted at all. + + + + + The data was retreived through a request that was initiated from + our end, but there was no transport protection. + + + + + The data was retrevied through TLS protected request that was + initaited from our end, to a host that had a valid TLS certificate. + + + + + The data was signed and have been verified by a signing key. + + + + + Data is from a local configuration source. E.g. metadata or a + certificate loaded from disk. + + + + + Represents the assertion consumer service command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.AcsCommandName). + + + + + Run the command, initiating or handling the assertion consumer sequence. + + Request data. + Options + CommandResult + + + + Reimplementation of System.Web.HttpCacheability. + + + + + Value is not initialized and probably a mistake. + + + + + Sets the Cache-Control: no-cache header. + + + + + The default value. Sets the cache control to "private". + + + + + Specifies that the response is cached only at the origin server. + + + + + Will disallow anyone but the server to cache the result. + + + + + Sets the Cache-Control to public. + + + + + The response is cached in the client and the server but nowhere else. + + + + + Factory to create the command objects thand handles the incoming http requests. + + + + + The name of the Assertion Consumer Service Command. + + + + + The name of the Sign In Command. + + + + + The name of the Log Out Command. + + + + + The metadata command has no name - it is triggered at base url for + Saml2. + + + + + Gets a command for a command name. + + Name of a command. Probably a path. A + leading slash in the command name is ignored. + A command implementation or notFoundCommand if invalid. + + + + The results of a command. + + + + + Status code that should be returned. + + + + + Cacheability of the command result. + + + + + Location, if the status code is a redirect. + + + + + The extracted principal if the command has parsed an incoming assertion. + + + + + Session termination time. Priority order: 1. SessionNotOnOrAfter in + assertion. 2. WIF configured lifetime with SessionSecurityTokenHandler + 3. SessionSecurityTokenHandler default. + + + + + The response body that is the result of the command. + + + + + The Mime-type + + + + + Data relayed from a previous request, such as the dictionary storing + the Owin Authentication Properties. + + + + + Indicates that the local session should be terminated. Used by + logout functionality. + + + + + Name of cookie to set. + + + + + Value of the "Secure" flag for the cookie (relevant if != null). + + + + + SAML RelayState value + + + + + Request state to store so that it is available on next http request. + + + + + Serialized request state. + + + + + Name of cookie to be cleared. + + + + + Ctor + + + + + Can be set by a notification callback to indicate that the + has been handled and should not + be applied by the Saml2 library to the response. + + + + + Other headers that should be set on the response. + + + + + The data of a http request that Saml2 needs to handle. A separate DTO is used + to make the core library totally independent of the hosting environment. + + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Function that reads cookie if it exists + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Escape a Base 64 encoded cookie value, matching the unescaping + that is done in the ctor. + + Data to escape + Escaped data + + + + The http method of the request. + + + + + The complete Url of the request. + + + + + The form data associated with the request (if any). + + + + + The query string parameters of the request. + + + + + The root Url of the application. This includes the virtual directory + that the application is installed in, e.g. http://hosting.example.com/myapp/ + + + + + RelayState from SAML message + + + + + Request state from a previous call, carried over through cookie. + + + + + User (if any) associated with the request + + + + + A command - corresponds to an action in Mvc. + + + + + Run the command and return a result. + + The http request that the input + data can be read from. + The options to use when performing the command. + The results of the command, as a DTO. + + + + Represents the logout command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.LogoutCommandName). + + + + + Run the command, initiating or handling the logout sequence. + + Request data. + Options + CommandResult + + + + Run the command, initating or handling the logout sequence. + + Request data. + Path to return to, only used if this + is the start of an SP-initiated logout. + Options + CommandResult + + + + Initiatiate a federated logout. + + Request data + Return url to redirect to after logout + optins + Terminate local session as part of signout? + + + + + Represents the service provider metadata command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.MetadataCommandName). + + + + + Run the command, creating and returning the service provider metadata. + + Request data. + Options + CommandResult + + + + Represents a missing command. + Instances of this class are returned by CommandFactory.GetCommand(...) + when the specified command name is not recognised. + + + + + Run the command, returning a CommandResult specifying an HTTP 404 Not Found status code. + + Request data. + Options + CommandResult + + + + Saml2 Artifact binding. + + + + + + + + + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + Options used to look up details of issuing + idp when needed (artifact binding). + True if the binding supports the current request. + + + + Create a SAML artifact value. + + Entity id of the artifact issuer. + Index of the artifact resolution endpoint + that the requester should use to resolve the artifact. + + + + Binds a message to a http response with HTTP Redirect. + + Message to bind. + Logger to use. + CommandResult. + + + + Pending messages where the artifact has been sent. + + + + + The result of a Saml2Binding.UnBind. + + + + + Ctor + + The data payload + The associated relay state. + Level of trust that can be put in data. + Does not care about any signature included in the data. + + + + The data payload. + + + + + The associated relay state, if any. Otherwise null. + + + + + Trust level indicating how much the message contents can be + trusted. + + + + + Abstract base for all Saml2Bindings that binds a message to a specific + kind of transport. + + + + + Uri identifier of the HTTP-POST binding. + + + + + Uri identifier of the HTTP-Redirect binding. + + + + + Uri identifier of the HTTP-Artifact binding. + + + + + Uri identifier of the Discovery Response SAML extension. + + + + + Uri identifier of the SOAP binding. + + + + + Binds a message to a http response. + + Message to bind. + Logger to log use, can be null. + CommandResult. + + + + Binds a message to an http response. + + Type of the message. + Message to bind + Logger to log use, can be null. + Notification to call for modification of XDocument, can be null. + CommandResult. + + + + Binds a message to a http response. + + Message to bind. + CommandResult. + + + + Extracts a message out of the current HttpRequest. + + Current HttpRequest. + Options, used to look up certificate information + in bindings that validate signatures. If set to null, the returned + result will have TrustLevel.None. + Extracted message. + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + True if the binding supports the current request. + + + + Get a cached binding instance that supports the requested type. + + Type of binding to get + A derived class instance that supports the requested binding. + + + + Get a cached binding instance that can handle the current request. + + Current HttpRequest + A derived class instance that supports the requested binding, + or null if no binding supports the current request. + + + + Gets the Saml2BindingType enum value for a Saml2Binding type uri, where the + uri should be one specified in the standard. + + Uri for the binding. + Binding type enum value. + If the uri doesn't correspond to a known binding. + + + + Gets the Uri for a Saml2BindingType. + + Saml2BindingType + Uri constant for the speicified Binding Type + If the type is not mapped. + + + + Saml2 binding types. + + + + + The http redirect binding according to saml bindings section 3.4 + + + + + The http post binding according to saml bindings section 3.5 + + + + + The artifact resolution binding according to bindings section 3.6 + + + + + The urls of Saml2 that are used in various messages. + + + + + Resolve the urls for Saml2 from an http request and options. + + Request to get application root url from. + Options to get module path and (optional) notification hooks from. + + + + Creates the urls for Saml2 based on the complete base Url + the application and the Saml2 base module path. + + The full Url to the root of the application. + Path of module, starting with / and ending without. + + + + Creates the urls for Saml2 based on the given full urls + for assertion consumer service and sign-in + + The full Url for the Assertion Consumer Service. + The full Url for sign-in. + The full Url for the application root. + + + + The full url of the assertion consumer service. + + + + + The full url of the signin command, which is also the response + location for idp discovery. + + + + + The full url of the application root. Used as default redirect + location after logout. + + + + + The full url of the logout command. + + + + + Represents the sign in command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.SignInCommandName). + + + + + Run the command, initiating the sign in sequence. + + Request data. + Options + CommandResult + + + + Initiate the sign in sequence. + + Entity id of idp to sign in to, or + null to use default (discovery service if configured) + Path to redirect to when the sign in + is complete. + The incoming http request. + Options. + Data to store and make available when the + ACS command has processed the response. + Command Result + + + + Extension methods and helpers for XmlDocument/XmlElement etc. + + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + + + + Creates an Xml document with secure settings and initialized it from + a string. + + Source string to load + Xml document + + + + Create an Xml Document with secure settings, specifically + disabling xml external entities. Also set PreserveWhiteSpace = true + + Xml Document + + + + Remove the attribute with the given name from the collection. + + Attribute collection. + Name of attribute to remove. + + + + Remove the child xml element with the specified name. + + Parent + Name of child + Namespace of child + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + Uri of signing algorithm to use. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + The signing algorithm to use. + + + + Checks if an xml element is signed by the given certificate, through + a contained enveloped signature. + + Xml Element that should be signed + Signing keys to test, one should validate. + Should the certificate be validated too? + The mininum signing algorithm + strength allowed. + True on correct signature, false on missing signature + If the data has + been tampered with or is not valid according to the SAML spec. + + + + Workaround for a bug in Reference.LoadXml incorrectly counting index + of signature from the start of the document, not from the start of + the element. Reported to Microsoft at + https://connect.microsoft.com/VisualStudio/feedback/details/2288620 + + SignedXml + Signature element. + + + + Check if the signature method is at least as strong as the mininum one. + + + + If the signaturemethod is too weak. + + + + Pretty an xml element. + + Xml to pretty print. + Nicely indented and readable data. + + + + Store a list of signing algorithms that are available in SignedXml. + This needs to be done through reflection, to keep the library + targetting lowest supported .NET version, while still getting + access to new algorithms if the hosting application targets a + later version. + + + + diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.dll b/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.dll new file mode 100644 index 0000000..6d2203d Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.dll differ diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.xml b/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.xml new file mode 100644 index 0000000..0fdd449 --- /dev/null +++ b/packages/Sustainsys.Saml2.2.11.0/lib/net47/Sustainsys.Saml2.xml @@ -0,0 +1,4509 @@ + + + + Sustainsys.Saml2 + + + + + Is this certificate for current or future use? + + + + + The certificate is used for current requests + + + + + The certificate is used for current and/or future requests + + + + + How is the certificate used? + + + + + The certificate is used for either signing or encryption, or both. + Equivalent to Signing | Encryption. + + + + + The certificate is used for signing outbound requests + + + + + The certificate is used for decrypting inbound assertions + + + + + The certificate is used as a Tls Client certificate for outbound + tls requests. + + + + + Extension methods for claims. + + + + + Create a Saml2NameIdentifier from a claim. + + Name identifier or Saml2 logout info claim. + Saml2NameIdentifier + The field order is:NameQualifier,SPNameQualifier,Format,SPProvidedID,Value + + + + Extension methods for Claims Identities + + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + In response to id + The destination Uri for the message + Saml2Assertion + + + + + Create a Saml2NameIdentifier from the identity. + + Identity to get NameIdentifier claim from. + Saml2NameIdentifier + + + + Config collection of ArtifactResolutionElements. + + + + + Factory for element type. + + + + + + Get an identifying key of the element. + + Element + Index of endpoint + + + + Generic enumerator. + + Generic enumerator + + + + Configuration of an artifact resolution service endpoint on an idp. + + + + + Index of the artifact resolution service endpoint. + + + + + Location of the endpoint. + + + + + Collection of certificate elements. + + + + + Create a new element of the right type. + + A new certificate element + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Config element for the signing certificate. + + + + + Allows local modification of the configuration for testing purposes + + + + + + File name of cert stored in file. + + + + + Store name to search. + + + + + Store location to search. + + + + + The search term used for searching the certificate store. + + + + + Find type, what field to search. + + + + + Load the certificate pointed to by this configuration. + + Certificate + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Ctor + + + + + Ctor + + Config element to load + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Honor the owin authentication mode even on logout. Normally the logout + handling is always done as if the middleware was active, to allow for + simple sign out without specifying an auth type. + + + + + Do not read the AuthnContext element in Saml2Response. + If you do not need these values to be present as claims in the generated + identity, using this option can prevent XML format errors (IDX13102) + e.g. when value cannot parse as absolute URI + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Handling logout requires access to the authenticated user session. If logout + is done over the POST binding, the session cookie must have SameSite=None + set (which is probably a bad idea). To avoid problems, disable logout + over POST in metadata by default. + + + + + SAML2 Specs says in section 4.4.4.2: + "... The responder MUST authenticate itself to the requester and ensure message integrity, either by signing the message or using a binding-specific mechanism." + + Unfortunately not all IDP seem to follow the specification. Disables requirement for a signed LogoutResponse. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Collection of items with two sources: configured and loaded dyanically. + The dynamically loaded can reset while the configured are kept. + metadata. + + + + + Add a configured key. + + Key to add. + + + + Add a configured certificate. + + Certificate to add. + + + + Set the complete set of loaded items keys. Previously loaded items + are cleared, configured items remain. + + Items to set + + + + The loaded items. + + + + + Gets an enumerator to the combined set of keys. + + Enumerator + + + + Contact person for a SAML2 entity. + + + + + The type of this contact. A value from the + System.IdentityModel.Metadata.ContactType enumeration. + + + + + Name of the company of the contact. + + + + + Given name of the contact. + + + + + Surname of the contact. + + + + + Phone number of the contact. + + + + + E-mail of the contact. + + + + + Config collection of contacts. + + + + + Create a new element of the right type. + + A new ContactPersonElement. + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Converts between string and EntityId, used by the configuration system to + allow configuration properties of type EntityId. + + + + + Converts a string to an EntityId + + Ignored + Ignored + String to convert + EntityID + + + + Config collection of federations. + + + + + Create new elemnt of the right type. + + FederationElement + + + + Get the key of an element, which is the metadata url. + + FedertionElement + + + + + Generic IEnumerable implementation. + + Enumerator + + + + Registers the identity providers from the configured federations in the identity provider dictionary. + + Current options. + + + + Configuration of a federation. + + + + + Location (url, local path or app relative path such as ~/App_Data) + where metadata is located. + + + + + Are unsolicited responses from the idps in the federation allowed? + + + + + Signing certificates for the federation + + + + + Config collection of IdentityProviderElements. + + + + + Create new element of right type. + + IdentityProviderElement + + + + Get the name of an element. + + IdentityProviderElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured identity providers in the dictionary of active idps. + + Current options. + + + + A thread safe wrapper around a dictionary for the identity providers. + + + First I thought about using a ConcurrentDictionary, but that does not maintain + any order of the added objects. Since the first idp added becomes the default idp, + the order must be preserved. And there has to be queuing semantics if the first idp + is dynamically loaded from a federation and later removed. Locks are simple and + this part of the code shouldn't be that performance sensitive. + + + + + Gets an idp from the entity id. + + entity Id to look up. + IdentityProvider + + + + Add an identity provider to the collection.. + + Identity provider to add. + + + + The default identity provider; i.e. the first registered of the currently known. + + + + + Gets all currently known identity providers. Note that the returned + enumeration is a copy to avoid race conditions. + + + + + Try to get the value of an idp with a given entity id. + + Entity id to search for. + The idp, if found. + True if an idp with the given entity id was found. + + + + Checks if there are no known identity providers. + + + + + Removes the idp with the given entity id, if present. If no such + entity is found, nothing is done. + + EntityId of idp to remove. + + + + Config element for the identity provider element. + + + + + Allows local modification of the configuration for testing purposes + + + + + + EntityId as presented by the idp. Used as key to configuration. + + + + + Destination url to send sign in requests to. + + + + + Single logout url endpoint of Idp. + + + + + The binding to use when sending requests to the Idp. + + + + + Certificate location for the certificate the Idp uses to sign its messages. + + + + + Signing algorithm for outbound messages to this Idp. Overrides the + main signature algorithm configured in . + + + + + Allow unsolicited responses. That is InResponseTo is missing in the AuthnRequest. + If true InResponseTo is not required. + If false InResponseTo is required. + Even though AllowUnsolicitedAuthnResponse is true the InResponseTo must be valid if existing. + + + + + Enable automatic downloading of metadata form the well-known uri (i.e. interpret + the EntityID as an uri and download metadata from it). + + + + + Metadata location url to be used for automatic downloading of metadata. + + + + + Artifact Resolution endpoints for the identity provider. + + + + + Does this Idp want the AuthnRequests to be signed? + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Indicates that the IDP sends the return url as part of the RelayState. + This is used when is enabled. + + + + + Root interface for the options objects, handling all configuration of + Saml2. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp list and the notifications. + + + + + Information about known identity providers. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Metadata configuration. + + + + + Used by tests to write-enable config. + + + + + Is the element contents read only? Always true in production, but + can be changed during tests. + + Is the element contents read only? + + + + Information about organization. + + + + + Optional attribute that describes for how long anyone may cache the metadata + presented by the service provider. Defaults to 1 hour. + + + + + How long after generation should the metadata be valid? + + + + + Collection of contacts. + + + + + Requested attributes of the service provider. + + + + + Metadata flag that we want assertions to be signed. + + + + + NamedId policy configuration element. + + + + + Allow create. + + + + + The NameId format. + + + + + Options implementation for handling in memory options. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Reads the options from the current config file. + + Options object. + + + + Creates an options object with the specified SPOptions. + + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Available identity providers. + + + + + Information about the organization responsible for the entity. + + + + + Is this section readonly? + + Is this section readonly? + + + + Name of the organization. + + + + + Display name of the organization. + + + + + Url of the organization. + + + + + The language that should be used for the organization strings. + + + + + Config for a requested element in the SPs metadata. + + + + + Name of the attribute. Usually on the form urn:oid:.... + + + + + Friendly, human readable name of the attribute. + + + + + Format of the Name property, one of the standard Uris in the saml specification. + + + + + Is this attribute required by the SP for it to work correctly? + + + + + Collection of requested attributes that an SP wants in incoming assertions. + + + + + Create a new element of the right type. + + A new RequestedAttributeElement + + + + Get the key of an element. + + Element to get key of. + The name of the requested attribute. + + + + Get a generic enumerator to the collection. + + Generic enumerator + + + + Configuration of RequestedAuthnContext in generated AuthnRequests. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + AuthnContextClassRef. Either a full URL or the last word of a + standard URL. + + + + + Comparison mode of AuthnContextClassRef + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Notification called when a + has been created. The authenticationrequest can be amended and + modified. + + + + + Notification called when the SignIn command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the SignIn command is about to select + what Idp to use for the request. The EntityId is the one supplied + (e.g. through query string). To select a specicic IdentityProvider + simply return it. Return null to fall back to built + in selection. + + + + + Notification called to decide if a SameSite=None attribute should + be set for a cookie. The default implementation is based on the pseudo + code in https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/ + More covering code can be found at + https://www.chromium.org/updates/same-site/incompatible-clients but that cannot + be shipped with the library due to the license. + + + + + Notification called when the logout command is about to use the + StoredRequestState derived from the request's RelayState data. + Return a different StoredRequestState if you would like to customize the + RelayState lookup. + + + + + Notification called when a command is about to construct a fully-qualified url + Return a non-null Uri if you need to override this per request. Otherwise + it will fall back to the normal logic that checks the request Uri + and the SPOptions.PublicOrigin setting + + + + + Notification called when single logout status is returned from IDP. + Return true to indicate that your notification has handled this status. Otherwise + it will fall back to the normal status processing logic. + + + + + Get a binding that can unbind data from the supplied request. The + default is to use + + + + + Notification called when the command has extracted data from + request (by using ) + + + + + Notification called when the ACS command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the Logout command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when a logout request is created to initiate single log + out with an identity provider. + + + + + Notification called when a logout request has been transformed to an XML node tree. + + + + + Notification called when a logout request has been received and processed and a Logout Response has been created. + + + + + Notification called when metadata has been created, but before + signing. At this point the contents of the metadata can be + altered before presented. + + + + + Notification called when the Metadata command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called by the SignIn and Logout commands to validate a ReturnUrl that is not relative. + Return true to indicate that you accept the ReturnUrl, false otherwise. + Default validation do not accept any absolute URL. + When false is returned, the SignIn and Logout commands will throw an . + + + + + Notification called when getting an identity provider. Default version is to return + the given idp from Options.IdentityProviders. + + + + + Callbacks that allow modifying the validation behavior in potentially unsafe/insecure ways + + + + + Callbacks that allow modification of validation behavior in potentially unsafe/insecure ways + + + + + Notification called when the token handler has populated the + . Modify it's properties to customize + the generated validation parameters. + + + + + Notification called when an incoming Saml Response contains an unexpected + InResponseTo value. Return true to acceppt the message despite this. + + This notification has been added to aid in troubleshooting a + hard-to-track-down issue. It will be removed in a future release if a + better solution is identified thanks to the added production analysis + that this enables. + + + + Certificates used by the service provider for signing, decryption and + TLS client certificates for artifact resolve. + + + + + Add a certificate to the collection with default status use and + metadata behaviour. + + Certificate to add. + + + + Add to the collection at the specified position. + + Position index. + Service certificate to add. + + + + Config element for the service certificate element. + + + + + Is this certificate for current or future use? + + + + + Intended use of the certificate + + + + + How should we override the metadata publishing rules? + + + + + Config collection of ServiceCertificateElements. + + + + + Create new element of right type. + + ServiceCertificateElement + + + + Get the name of an element. + + ServiceCertificateElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured service certificates. + + Current options. + + + + Signing behavior for requests. + + + + + Sign authnrequests if the idp is configured for it. This is the + default behavior. + + + + + Always sign AuthnRequests. AuthnRequestsSigned is set to true + in metadata. + + + + + Never sign AuthnRequests. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Ctor + + + + + Construct the options from the given configuration section + + + + + + Return Uri to redirect the client to, if no return uri was specified + when initiating the signin sequence. + + + + + Recommendation of cache refresh interval to those who reads our + metadata. + + + + + Maximum validity duration after fetch for those who reads our + metadata. Exposed as an absolute validUntil time in the metadata. + If set to null, no validUntil is exposed in metadata. + + + + + The security token handler used to process incoming assertions for this SP. + The default value is to lazy create one using the current EntityId. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + Application root relative path for Saml2 endpoints. The + default is "/Saml2". + + + + + By default, the service provider uses the host, protocol, port and + application root path from the HTTP request when creating links. + This might not be accurate in reverse proxy or load-balancing + situations. You can override the origin used for link generation + for the entire application using this property. To override per request, + implement a GetPublicOrigin Notification function. + + + + + Metadata describing the organization responsible for the entity. + + + + + NameId Policy. + + + + + RequestedAuthnContext + + + + + Collection of contacts for the SAML2 entity. + + + + + Collection of attribute consuming services for the service provider. + + + + + Certificates used by the service provider for signing or decryption. + + + + + Certificates valid for use in decryption + + + + + Certificate for use in signing outbound requests + + + + + Certificates to be published in metadata + + + + + Signing behaviour for AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Metadata flag that we want assertions to be signed. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Minimum accepted signature algorithm for any incoming messages. + + + + + Adapter to logging framework of hosting application. + + + + + Template for token validation parameters. Some security critical validation + parameters are set for each use. The Unsafe.TokenValidationParametersCreated notification + is called after those are set if those need to be overriden. + + + + + Config section for the module. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + Current config as read from app/web.config. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + The Url to redirect back to after successfull authentication. + + + + + By default, the service provider uses the host, protocol, and port + from the HTTP request when creating links. This might not be + accurate in reverse proxy or load-balancing situations. You can + override the origin used for link generation using this property. + + + + + Set of identity providers known to the service provider. + + + + + Set of federations. The service provider will trust all the idps in these federations. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + Application root relative path for Saml2 endpoints. The + default is "Saml2". + + + + + NamedId policy element. + + + + + RequestedAuthnContext config. + + + + + Metadata describing the organization responsible for the entity. + + + + + Metadata of the service provider. + + + + + Contacts for the SAML2 entity. + + + + + Attribute consuming services. + + + + + Certificates used by the service provider for signing and/or decryption. + + + + + Signing behavior for created AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Weakest accepted signing algorithm for inbound messages. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Helper methods for DateTime formatting. + + + + + Format a datetime for inclusion in SAML messages. + + Datetime to format. + Formatted value. + + + + A SAML response was found, but could not be parsed due to formatting issues. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Exception thrown when an signature is not valid according to the + SAML standard. + + + + + Default ctor + + + + + Ctor + + Message of exception + + + + Ctor + + Message + Inner exception + + + + Serialization Ctor + + Serialization info + Serialization context + + + + No saml response was found in the http request. + + + + + Default Ctor, setting message to a default. + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Base class for authentication services specific exceptions, that might + require special handling for error reporting to the user. + + + + + Default Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed validation. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed InResponseTo validation because RelayState is lost, or an unsolicited response contains an InResponseTo + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Extended exception containing information about the status and status message SAML response. + + + + + Status of the SAML2Response + + + + + Status message of SAML2Response + + + + + Second level status of SAML2Response + + + + + Ctor, bundling the Saml2 status codes and message into the exception message. + + Exception message. + Status of the SAML2Response + Status message of SAML2Response + Second level status of SAML2Response + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Represents a federation known to this service provider. + + + + + Ctor + + Config to use to initialize the federation. + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + For how long is the metadata that the federation has loaded valid? + Null if there is no limit. + + + + + Signing keys to use to verify the metadata before using it. + + + + + Permitted cache duration for the metadata. + + + + + Valid until + + + + + Represents a known identity provider that this service provider can communicate with. + + + + + Ctor + + Entity id of the identityprovider. + Service provider options to use when + creating AuthnRequests for this Idp. + + + + Should this idp load metadata? The metadata is loaded immediately + when the property is set to true, so the + must be correct before settingLoadMetadata to true. + + + + The binding used when sending AuthnRequests to the identity provider. + + + + + The Url of the single sign on service. This is where the browser is redirected or + where the post data is sent to when sending an AuthnRequest to the idp. + + + + + Artifact resolution endpoints on the idp. + + + + + The Url of the single sign out service. This is where the browser + is redirected or where the post data is sent to when sending a + LogoutRequest to the idp. + + + + + The Url to send single logout responses to. Defaults to + SingleLogoutServiceUrl. + + + + + Binding for the Single logout service. If not set, returns the + same as the main binding (used for AuthnRequests) + + + + + The Entity Id of the identity provider. + + + + + Is this idp allowed to send unsolicited responses, i.e. idp initiated sign in? + + + + + Does the RelayState contains the return url?, + This setting is used only when the AllowUnsolicitedAuthnResponse setting is enabled. + + + + + Location of metadata for the Identity Provider. Automatically enables + . The location can be a URL, an absolute + path to a local file or an app relative path + (e.g. ~/App_Data/IdpMetadata.xml). By default the entity id is + interpreted as the metadata location (which is a convention). + + + + + Create an authenticate request aimed for this idp. + + Urls for Saml2, used to populate fields + in the created AuthnRequest + + + + Signing Algorithm to be used when signing oubound messages. + + + + + Bind a Saml2 message using the active binding of the idp, + producing a CommandResult with the result of the binding. + + + This overload does not support the usage of Xml Created notifications. + + The Saml2 message to bind. + CommandResult with the bound request. + + + + Bind a Saml2 message using the active binding of hte idp, + producing a CommandResult with the result of the binding. + + Type of the message. + The Saml2 message to bind. + Notification to call with Xml structure + CommandResult with the bound message. + + + + The public key of the idp that is used to verify signatures of responses/assertions. + + + + + Reads the supplied metadata and sets all properties of the + IdentityProvider based on the metadata. + + Metadata to read. + + + + Validity time of the metadata this idp was configured from. Null if + idp was not configured from metadata. + + + + + Does this Idp want the AuthnRequests signed? + + + + + Create a logout request to the idp, for the current identity. + + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Interface for an adapter around the logging framework used on each + platform. + + + + + Write informational message. + + Message to write. + + + + Write an error message + + Message + Exception to include in error message. + + + + Write an informational message on the verbose level. + + Message to write + + + + SymmetricAlgorithm decrypting implementation for http://www.w3.org/2009/xmlenc11#aes128-gcm. + This is class is not a general implementation and can only do decryption. + + + + + A WebClient implementation that will add a list of client + certificates to the requests it makes. + + + + + Register the certificate to be used for this requets. + + Certificates to offer to server + + + + Override the base class to add the certificate + to the reuqest before returning it. + + + + + + + Helpers for delimited string, with support for escaping the delimiter + character. + + + + + Join strings with a delimiter and escape any occurence of the + delimiter and the escape character in the string. + + Strings to join + Joined string + + + + Split strings delimited strings, respecting if the delimiter + characters is escaped. + + Joined string from + Unescaped, split strings + + + + Class to help with mapping virtual paths relative to the server. + + + + + Returns the base path of the website or application running. + + + + + Maps a virtual path to the BasePath of the running appliction. + + The virtual path that needs to mapped relative to the server. + A file path. + + + + Determines if a virtual path is relative or not. + + The path that is to be tested. + True if the path is relative otherwise false. + + + + Determines if a url is relative to current host, excluding protocol-relative addresses + + The path that is to be tested. + True if the url is relative otherwise false. + + + + Class implements static methods to help parse a query string. + + + + + Splits a query string into its key/value pairs. + + A query string, with or without the leading '?' character. + A collecktion with the parsed keys and values. + + + + AES-GCM Nonce size defined in https://www.w3.org/TR/xmlenc-core1/#sec-AES-GCM + + + + + Crypto description for a Managed implementation of SHA256 signatures. + + + + + Ctor + + + + + Create a deformatter + + Key + Deformatter + + + + Create a formatter + + Key + Formatter + + + + How should we override the metadata publishing rules + + + + + No override. Published according to the normal rules. + + + + + Publish as Unspecified + + + + + Publish as Encryption + + + + + Publish as Signing + + + + + Do not publish + + + + + Metadata for an attribute consuming service. + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Is the service required? + + + + + The name of the attribute consuming service. + + + + + Description of the attribute consuming service + + + + + Requested attributes. + + + + + Use this instance for reading metadata. It uses custom extensions + to increase feature support when reading metadata. + + + + + An indexed entry with an optional default + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + A collection of indexed entries with support for getting the + configured default entry + + The type stored in the collection + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Extensions for Metadatabase. + + + + + Use a MetadataSerializer to create an XML string out of metadata. + + Metadata to serialize. + Certificate to sign the metadata + with. Supply null to not sign. + Algorithm to use when signing. + + + + Helper for loading SAML2 metadata + + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + EntityDescriptor containing metadata + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + If the metadata contains + an EntitiesDescriptor, try to unpack it and return a single + EntityDescriptor inside if there is one. + EntityDescriptor containing metadata + + + + Load and parse metadata for a federation. + + Url to metadata + Extended entitiesdescriptor + + + + Load and parse metadata for a federation. + + Url to metadata + + Validate the certificate when doing + signature validation. Normally a bad idea with SAML2 as certificates + are not required to be valid but are only used as conventient carriers + for keys. + Mininum strength accepted + for signing algorithm. + Extended entitiesdescriptor + + + + Specifies an attribute requested by the service provider. + + + + + Ctor + + Name of the attribute. + + + + Ctor + + Name of the attribute. + Value of the attribute. + + + + Is this attribute required by the service provider? + + + + + Uri used for NameFormat to specify that the Name is a Uri. + + + + + Uri used for NameFormat to specify that the format of the Name + is unspecified. + + + + + Uri used for NameFormat to specify that the format of the Name + fulfills the standard's basic requirements. + + + + + Extensions for NameIdFormat enum. + + + + + Get the full Uri for a NameIdFormat. + + NameIdFormat to get Uri for + Uri + + + + Logger adapter that does nothing. + + + + + Write an error message + + Message + Exception to include in error message. + + + + Write informational message. + + Message to write. + + + + Write an informational message on the verbose level. + + Message to write + + + + Generator of secure random keys.. + + + + + Create a unique random string with a cryptographically secure + random function. + + Random string 56-chars string + + + + Create a unique random array with a cryptographically secure + random function. + + 20 random bytes. + + + + Simple default implementation of detection of browsers/devices not compatible with + the SameSite=None cookie attribute. + Based on https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1 + + + + + Should a SameSite=None cookie attribute be emitted? + + User Agent string + True if SameSite=None should be emitted. + + + + Extension methods for Saml2Assertion + + + + + Writes out the assertion as an XElement. + + The assertion to create xml for. + XElement + + + + Claim type constants. + + + + + Session index is set by the idp and is used to correlate sessions + during single logout. + + + + + Original subject name identifier from the SAML2 idp, that should + be logged out as part of a single logout scenario. + + + + + Extension methods for Saml2Condition + + + + + Writes out the conditions as an XElement. + + Conditions to create xml for. + XElement + + + + Extension methods for Saml2NameId + + + + + Create XElement for the Saml2NameIdentifier. + + + + + + + SAML2 namespace constants. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace Uri of Saml2 protocol. + + + + + Namespace of SAML2 assertions. + + + + + Namespace of SAML2 assertions. + + + + + Namespace Uri of SAML2 assertions. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for Xml schema instance. + + + + + Namespace for Soap envelope. + + + + + Namespace for Soap envelope. + + + + + Comparison setting for RequestedAuthnContext, see SAML2 Core spec 3.3.2.2.1. + + + + + Exact match is required. This is the default. + + + + + The resulting AuthnContext must be at least as strong as the + specified classRef. + + + + + The resulting AuthnContext must be at most as strong as the + specified classRef. + + + + + The resulting AuthnContext must be better than the specified + classRef. The classRef specified is thus not permitted. + + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Common properties of all Saml2 message implementations (both requests + and responses). There is no corresponding definition in the SAML2 + standard, so this is made up of the common fields of 3.2.2 Complex Type + StatusResponseType (the base type for all responses) and of 3.2.1 Complex + Type RequestAbstractType. + + + + + The destination of the message. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Issuer of the message. + + + + + Serializes the message into wellformed XML. + + Saml2 message to transform to XML + Notification allowing modification of XML tree before serialization. + string containing the Xml data. + + + + The NameId Format. + + + + + No NameId format has been configured. No format will be included + in AuthnRequests and metadata. + + + + + 8.3.1 Unspecified + + + + + 8.3.2 Email Address + + + + + 8.3.3 X.509 Subject Name + + + + + 8.3.4 Windows Domain Qualified Name + + + + + 8.3.5 Kerberos Principal Name + + + + + 8.3.6 Entity Identifier + + + + + 8.3.7 Persistent Identifier + + + + + 8.3.8 Transient Identifier + + + + + Artifact resolution request, corresponds to section 3.5.1 in SAML + core specification. + + + + + Artifact to resolve. + + + + + The SAML2 request name + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 ArtifactResponse message as specified in SAML2 Core 3.5.2. + + + + + Ctor + + Parsed XML with message. + + + + Contained message. + + + + + Status code of the Artifact response. + + + + + An authentication request corresponding to section 3.4.1 in SAML Core specification. + + + + + Default constructor + + + + + The SAML2 request name + + + + + Serializes the request to a Xml message. + + XElement + + + + Serializes the message into wellformed Xml + + string containing the Xml data. + + + + Read the supplied Xml and parse it into a authenticationrequest. + + xml data. + Relay State attached to the message or null if not present. + Saml2Request + On xml errors or unexpected xml structure. + + + + Ctor + + Xml data + RelayState associateed with the message. + + + + The assertion consumer url that the idp should send its response back to. + + + + + Index to the SP metadata where the list of requested attributes is found. + + + + + Scoping for request + + + + + NameId policy. + + + + + RequestedAuthnContext. + + + + + Binding type to request the Idp to use when responding. + + + + + Sets whether request should force the idp to authenticate the presenter directly, + rather than rely on a previous security context. + If false, the ForceAuthn parameter is omitted from the request. + If true, the request is sent with ForceAuthn="true". + + + + + Sets whether request should request for SAML Passive login if possible, + If false, the IsPassive parameter is omitted from the request. + If true, the request is sent with IsPassive="true". + + + + + The Saml2IdPEntry specifies a single identity provider trusted by the + requester to authenticate the presenter + + + + + Initializes a new instance of the class. + + The provider identifier. + + + + A URI reference representing the location of a profile-specific + endpoint supporting the authentication request protocol. The + binding to be used must be understood from the profile of use. + + + + + A human-readable name for the identity provider. + + + + + The Entity Id of the Identity Provider. Cannot be null. + + + + + Create XElement for the Saml2IdPEntry. + + + + + A Saml2 LogoutRequest message (SAML core spec 3.7.1) + + + + + Ctor + + + + + Ctor + + Id of message. + + + + Create Saml2LogoutRequest from data in Xml. + + Xml data to initialize the Saml2LogoutRequest from. + + + + The SAML2 request name + + + + + Name id to logout. + + + + + Session index to logout. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 Logout Response. + + + + + Ctor + + Status of the response. + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Appends xml for the Saml2LogoutResponse to the given parent node. + + Xml for the Saml2LogoutResponse is appended + to the children of this node. + + + + Load values into Saml2LogoutResponse from passed xml element + + XmlElement containing a LogoutResponse + Saml2LogoutResponse + + + + The NameId policy. + + The class is used in created AuthnRequests, so it is + immutable to avoid unintended changes. + + + + Ctor + + + + + + + Value of AllowCreate attribute. Set to null to omit. + + + + + The NameId format. + + + + + Somewhat ugly subclassing to be able to access some methods that are protected + on Saml2SecurityTokenHandler. The public interface of Saml2SecurityTokenHandler + expects the actual assertion to be signed, which is not always the case when + using Saml2-P. The assertion can be embedded in a signed response. Or the signing + could be handled at transport level. + + + + + Process authentication statement from SAML assertion. WIF chokes if the authentication statement + contains a DeclarationReference, so we clear this out before calling the base method + http://referencesource.microsoft.com/#System.IdentityModel/System/IdentityModel/Tokens/Saml2SecurityTokenHandler.cs,1970 + + Authentication statement + Claim subject + Assertion Issuer + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Base class for saml requests, corresponds to section 3.2.1 in SAML Core specification. + + + + + The id of the request. + + + + + Version of the SAML request. Always returns "2.0" + + + + + The instant that the request was issued (well actually, created). + + + + + SAML message name for requests - hard coded to SAMLRequest. + + + + + The destination of the request. + + + + + The issuer of the request. + + + + + The additional content to append within an Extensions element. + + + + + The SAML2 request name + + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Creates XNodes for the fields of the Saml2RequestBase class. These + nodes should be added when creating XML out of derived classes. + + + + + + Reads the request properties present in Saml2RequestBase + Also validates basic properties of the request + + The xml document to parse + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + RelayState attached to the message. + + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Configuration of RequestedAuthnContext + + + + + Ctor + + Config element to load. + + + + Ctor + + AuthnContextClassRef + Comparison + + + + Authentication context class reference. + + + + + Comparison method. + + + + + Represents a SAML2 response according to 3.3.3. The class is immutable (to an + external observer. Internal state is lazy initiated). + + + + Holds all assertion element nodes + + + + Read the supplied Xml and parse it into a response. + + xml data. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + Saml2Response + On xml errors or unexpected xml structure. + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + Audience of the response, set as AudienceRestriction + response. Each identity is translated into a separate assertion. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + The response as an xml element. Either the original xml, or xml that is + generated from supplied data. + + + + + Transforms the message to an XElement object tree. + + This operation is inefficient, but it is only used by + the StubIdp so it's acceptable. + XElement with Xml representation of the message + + + + SAML Message name for responses, hard coded to SAMLResponse. + + + + + string representation of the Saml2Response serialized to xml. + + string containing xml. + + + + Id of the response message. + + + + + Expected InResponseTo as extracted from + + + + + InResponseTo id. + + + + + Issue instant of the response message. + + + + + Status code of the message according to the SAML2 spec section 3.2.2.2 + + + + + StatusMessage of the message according to the SAML2 spec section 3.2.2.1 + + + + + Optional status which MAY give additional information about the cause of the problem (according to the SAML2 spec section 3.2.2.2))))))))). + Because it may change in future specifications let's not make enum out of it yet. + + + + + Issuer (= sender) of the response. + + + + + The destination of the response message. + + + + Gets all assertion element nodes from this response message. + All assertion element nodes. + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + ClaimsIdentities + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + Relay data stored when creating AuthnRequest, to be passed on to + GetIdentityProvider notification. + ClaimsIdentities + + + + RelayState attached to the message. + + + + + Session termination time for a session generated from this + response. + + + + + Saml2Scoping specifies a set of identity providers trusted by the + requester to authenticate the presenter, as well as limitations and + context related to proxying of the authentication request message to + subsequent identity providers by the responder. + + + + + Gets advisory list of identity providers and associated information + that the requester deems acceptable to respond to the request. + + + + + Fluent config helper that adds a to the + + + Idp entry to add + this + + + + Specifies the number of proxying indirections permissible between + the identity provider that receives the authentication request and + the identity provider who ultimately authenticates the principal. + A count of zero permits no proxying, while omitting (null) this + attribute expresses no such restriction. + + + + + Gets or sets the set of requesting entities on whose behalf the + requester is acting. Used to communicate the chain of requesters + when proxying occurs. + + + + + Fluent config helper that adds a requester id to the + + + Requester Id to add + this + + + + Create XElement for the Saml2Scoping. + + + + + Saml2 Soap binding implementation. + + + This class does not follow the pattern of the other three bindings + (Redirect, POST and Artifact) because it does not use the front channel + with messages being passed over the user's browser. + + + + + Create a SOAP body around a specified payload. + + Payload of the message. + + + + + Extract the body of a SOAP message. + + xml data + Parsed data. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Response. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Client certificates to offer to the server. + Response. + + + + Status codes, mapped against states in section 3.2.2.2 in the SAML2 spec. + + + + + Success. + + + + + Error because of the requester. + + + + + Error because of the responder. + + + + + Versions doesn't match. + + + + + The responding provider was unable to successfully authenticate the principal + + + + + Unexpected or invalid content was encountered within a saml:Attribute or saml:AttributeValue element. + + + + + The responding provider cannot or will not support the requested name identifier policy. + + + + + The specified authentication context requirements cannot be met by the responder. + + + + + Used by an intermediary to indicate that none of the supported identity provider Loc elements in + an IDPList can be resolved or that none of the supported identity providers are available. + + + + + Indicates the responding provider cannot authenticate the principal passively, as has been requested. + + + + + Used by an intermediary to indicate that none of the identity providers in an IDPList are supported by the intermediary. + + + + + Used by a session authority to indicate to a session participant that it was not able to propagate logout to all other session participants. + + + + + Indicates that a responding provider cannot authenticate the principal directly and is not permitted to proxy the request further. + + + + + The SAML responder or SAML authority is able to process the request but has chosen not to + respond. This status code MAY be used when there is concern about the security context of the + request message or the sequence of request messages received from a particular requester. + + + + + The SAML responder or SAML authority does not support the request. + + + + + The SAML responder cannot process any requests with the protocol version specified in the request. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is a major upgrade from the highest protocol version supported by the responder. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is too low. + + + + + The resource value provided in the request message is invalid or unrecognized. + + + + + The response message would contain more elements than the SAML responder is able to return. + + + + + An entity that has no knowledge of a particular attribute profile has been presented with an attribute + drawn from that profile. + + + + + The responding provider does not recognize the principal specified or implied by the request. + + + + + The SAML responder cannot properly fulfill the request using the protocol binding specified in the + request. + + + + + Abstract Saml2 StatusResponseType class. + + + + + Ctor + + Status of the response + + + + The destination of the message. + + + + + Issuer of the message. + + + + + Id of request message, if this message is a response to a previous + request. + + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Status code of the message. + + + + + Id of the message. + + + + + Issue instant. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Extension methods for Saml2Statement + + + + + Writes out the statement as an XElement. + + Statement to create xml for. + XElement + + + + Extension methods for Saml2Subject + + + + + Writes out the subject as an XElement. + + The subject to create xml for. + XElement + + + + Writes out the subject confirmation as an XElement. + + + + + + + + Writes out the subject confirmation data as an XElement. + + + + + + + + Service Certificate definition + + + + + Ctor + + + + + Ctor for loading from configuration + + + + + + X509 Certificate + + + + + Is this certificate for current or future use? + + + + + What is the intended use of this certificate. + + + + + How should we override the metadata publishing rules? + + + + + Stored data for pending requests. + + + + + Start of the cookie name for state preservation. + + + + + Ctor + + The EntityId of the IDP the request was sent to + The Url to redirect back to after a succesful login + ID of the SAML message, used to match InResponseTo + Aux data that can be stored across the authentication request. + + + + The IDP the request was sent to + + + + + The Url to redirect back to after a succesful login + + + + + Message id of the originating Saml message. Should match InResponseTo + in the response. + + + + + Aux data that need to be preserved across the authentication call. + + + + + Get a serialized representation of the data. + + Serialized data + + + + Ctor that restores a StoredRequestState object from serialized + representation. + + data buffer + + + + The level of trust that a certain piece of data comes with. + + + + + The data cannot be trusted at all. + + + + + The data was retreived through a request that was initiated from + our end, but there was no transport protection. + + + + + The data was retrevied through TLS protected request that was + initaited from our end, to a host that had a valid TLS certificate. + + + + + The data was signed and have been verified by a signing key. + + + + + Data is from a local configuration source. E.g. metadata or a + certificate loaded from disk. + + + + + Represents the assertion consumer service command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.AcsCommandName). + + + + + Run the command, initiating or handling the assertion consumer sequence. + + Request data. + Options + CommandResult + + + + Reimplementation of System.Web.HttpCacheability. + + + + + Value is not initialized and probably a mistake. + + + + + Sets the Cache-Control: no-cache header. + + + + + The default value. Sets the cache control to "private". + + + + + Specifies that the response is cached only at the origin server. + + + + + Will disallow anyone but the server to cache the result. + + + + + Sets the Cache-Control to public. + + + + + The response is cached in the client and the server but nowhere else. + + + + + Factory to create the command objects thand handles the incoming http requests. + + + + + The name of the Assertion Consumer Service Command. + + + + + The name of the Sign In Command. + + + + + The name of the Log Out Command. + + + + + The metadata command has no name - it is triggered at base url for + Saml2. + + + + + Gets a command for a command name. + + Name of a command. Probably a path. A + leading slash in the command name is ignored. + A command implementation or notFoundCommand if invalid. + + + + The results of a command. + + + + + Status code that should be returned. + + + + + Cacheability of the command result. + + + + + Location, if the status code is a redirect. + + + + + The extracted principal if the command has parsed an incoming assertion. + + + + + Session termination time. Priority order: 1. SessionNotOnOrAfter in + assertion. 2. WIF configured lifetime with SessionSecurityTokenHandler + 3. SessionSecurityTokenHandler default. + + + + + The response body that is the result of the command. + + + + + The Mime-type + + + + + Data relayed from a previous request, such as the dictionary storing + the Owin Authentication Properties. + + + + + Indicates that the local session should be terminated. Used by + logout functionality. + + + + + Name of cookie to set. + + + + + Value of the "Secure" flag for the cookie (relevant if != null). + + + + + SAML RelayState value + + + + + Request state to store so that it is available on next http request. + + + + + Serialized request state. + + + + + Name of cookie to be cleared. + + + + + Ctor + + + + + Can be set by a notification callback to indicate that the + has been handled and should not + be applied by the Saml2 library to the response. + + + + + Other headers that should be set on the response. + + + + + The data of a http request that Saml2 needs to handle. A separate DTO is used + to make the core library totally independent of the hosting environment. + + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Function that reads cookie if it exists + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Escape a Base 64 encoded cookie value, matching the unescaping + that is done in the ctor. + + Data to escape + Escaped data + + + + The http method of the request. + + + + + The complete Url of the request. + + + + + The form data associated with the request (if any). + + + + + The query string parameters of the request. + + + + + The root Url of the application. This includes the virtual directory + that the application is installed in, e.g. http://hosting.example.com/myapp/ + + + + + RelayState from SAML message + + + + + Request state from a previous call, carried over through cookie. + + + + + User (if any) associated with the request + + + + + A command - corresponds to an action in Mvc. + + + + + Run the command and return a result. + + The http request that the input + data can be read from. + The options to use when performing the command. + The results of the command, as a DTO. + + + + Represents the logout command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.LogoutCommandName). + + + + + Run the command, initiating or handling the logout sequence. + + Request data. + Options + CommandResult + + + + Run the command, initating or handling the logout sequence. + + Request data. + Path to return to, only used if this + is the start of an SP-initiated logout. + Options + CommandResult + + + + Initiatiate a federated logout. + + Request data + Return url to redirect to after logout + optins + Terminate local session as part of signout? + + + + + Represents the service provider metadata command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.MetadataCommandName). + + + + + Run the command, creating and returning the service provider metadata. + + Request data. + Options + CommandResult + + + + Represents a missing command. + Instances of this class are returned by CommandFactory.GetCommand(...) + when the specified command name is not recognised. + + + + + Run the command, returning a CommandResult specifying an HTTP 404 Not Found status code. + + Request data. + Options + CommandResult + + + + Saml2 Artifact binding. + + + + + + + + + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + Options used to look up details of issuing + idp when needed (artifact binding). + True if the binding supports the current request. + + + + Create a SAML artifact value. + + Entity id of the artifact issuer. + Index of the artifact resolution endpoint + that the requester should use to resolve the artifact. + + + + Binds a message to a http response with HTTP Redirect. + + Message to bind. + Logger to use. + CommandResult. + + + + Pending messages where the artifact has been sent. + + + + + The result of a Saml2Binding.UnBind. + + + + + Ctor + + The data payload + The associated relay state. + Level of trust that can be put in data. + Does not care about any signature included in the data. + + + + The data payload. + + + + + The associated relay state, if any. Otherwise null. + + + + + Trust level indicating how much the message contents can be + trusted. + + + + + Abstract base for all Saml2Bindings that binds a message to a specific + kind of transport. + + + + + Uri identifier of the HTTP-POST binding. + + + + + Uri identifier of the HTTP-Redirect binding. + + + + + Uri identifier of the HTTP-Artifact binding. + + + + + Uri identifier of the Discovery Response SAML extension. + + + + + Uri identifier of the SOAP binding. + + + + + Binds a message to a http response. + + Message to bind. + Logger to log use, can be null. + CommandResult. + + + + Binds a message to an http response. + + Type of the message. + Message to bind + Logger to log use, can be null. + Notification to call for modification of XDocument, can be null. + CommandResult. + + + + Binds a message to a http response. + + Message to bind. + CommandResult. + + + + Extracts a message out of the current HttpRequest. + + Current HttpRequest. + Options, used to look up certificate information + in bindings that validate signatures. If set to null, the returned + result will have TrustLevel.None. + Extracted message. + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + True if the binding supports the current request. + + + + Get a cached binding instance that supports the requested type. + + Type of binding to get + A derived class instance that supports the requested binding. + + + + Get a cached binding instance that can handle the current request. + + Current HttpRequest + A derived class instance that supports the requested binding, + or null if no binding supports the current request. + + + + Gets the Saml2BindingType enum value for a Saml2Binding type uri, where the + uri should be one specified in the standard. + + Uri for the binding. + Binding type enum value. + If the uri doesn't correspond to a known binding. + + + + Gets the Uri for a Saml2BindingType. + + Saml2BindingType + Uri constant for the speicified Binding Type + If the type is not mapped. + + + + Saml2 binding types. + + + + + The http redirect binding according to saml bindings section 3.4 + + + + + The http post binding according to saml bindings section 3.5 + + + + + The artifact resolution binding according to bindings section 3.6 + + + + + The urls of Saml2 that are used in various messages. + + + + + Resolve the urls for Saml2 from an http request and options. + + Request to get application root url from. + Options to get module path and (optional) notification hooks from. + + + + Creates the urls for Saml2 based on the complete base Url + the application and the Saml2 base module path. + + The full Url to the root of the application. + Path of module, starting with / and ending without. + + + + Creates the urls for Saml2 based on the given full urls + for assertion consumer service and sign-in + + The full Url for the Assertion Consumer Service. + The full Url for sign-in. + The full Url for the application root. + + + + The full url of the assertion consumer service. + + + + + The full url of the signin command, which is also the response + location for idp discovery. + + + + + The full url of the application root. Used as default redirect + location after logout. + + + + + The full url of the logout command. + + + + + Represents the sign in command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.SignInCommandName). + + + + + Run the command, initiating the sign in sequence. + + Request data. + Options + CommandResult + + + + Initiate the sign in sequence. + + Entity id of idp to sign in to, or + null to use default (discovery service if configured) + Path to redirect to when the sign in + is complete. + The incoming http request. + Options. + Data to store and make available when the + ACS command has processed the response. + Command Result + + + + Extension methods and helpers for XmlDocument/XmlElement etc. + + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + + + + Creates an Xml document with secure settings and initialized it from + a string. + + Source string to load + Xml document + + + + Create an Xml Document with secure settings, specifically + disabling xml external entities. Also set PreserveWhiteSpace = true + + Xml Document + + + + Remove the attribute with the given name from the collection. + + Attribute collection. + Name of attribute to remove. + + + + Remove the child xml element with the specified name. + + Parent + Name of child + Namespace of child + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + Uri of signing algorithm to use. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + The signing algorithm to use. + + + + Checks if an xml element is signed by the given certificate, through + a contained enveloped signature. + + Xml Element that should be signed + Signing keys to test, one should validate. + Should the certificate be validated too? + The mininum signing algorithm + strength allowed. + True on correct signature, false on missing signature + If the data has + been tampered with or is not valid according to the SAML spec. + + + + Workaround for a bug in Reference.LoadXml incorrectly counting index + of signature from the start of the document, not from the start of + the element. Reported to Microsoft at + https://connect.microsoft.com/VisualStudio/feedback/details/2288620 + + SignedXml + Signature element. + + + + Check if the signature method is at least as strong as the mininum one. + + + + If the signaturemethod is too weak. + + + + Pretty an xml element. + + Xml to pretty print. + Nicely indented and readable data. + + + + Store a list of signing algorithms that are available in SignedXml. + This needs to be done through reflection, to keep the library + targetting lowest supported .NET version, while still getting + access to new algorithms if the hosting application targets a + later version. + + + + diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.dll b/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.dll new file mode 100644 index 0000000..5f2da54 Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.dll differ diff --git a/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.xml b/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.xml new file mode 100644 index 0000000..0fdd449 --- /dev/null +++ b/packages/Sustainsys.Saml2.2.11.0/lib/net8.0/Sustainsys.Saml2.xml @@ -0,0 +1,4509 @@ + + + + Sustainsys.Saml2 + + + + + Is this certificate for current or future use? + + + + + The certificate is used for current requests + + + + + The certificate is used for current and/or future requests + + + + + How is the certificate used? + + + + + The certificate is used for either signing or encryption, or both. + Equivalent to Signing | Encryption. + + + + + The certificate is used for signing outbound requests + + + + + The certificate is used for decrypting inbound assertions + + + + + The certificate is used as a Tls Client certificate for outbound + tls requests. + + + + + Extension methods for claims. + + + + + Create a Saml2NameIdentifier from a claim. + + Name identifier or Saml2 logout info claim. + Saml2NameIdentifier + The field order is:NameQualifier,SPNameQualifier,Format,SPProvidedID,Value + + + + Extension methods for Claims Identities + + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + Saml2Assertion + + + + Creates a Saml2Assertion from a ClaimsIdentity. + + Claims to include in Assertion. + Issuer to include in assertion. + Audience to set as audience restriction. + In response to id + The destination Uri for the message + Saml2Assertion + + + + + Create a Saml2NameIdentifier from the identity. + + Identity to get NameIdentifier claim from. + Saml2NameIdentifier + + + + Config collection of ArtifactResolutionElements. + + + + + Factory for element type. + + + + + + Get an identifying key of the element. + + Element + Index of endpoint + + + + Generic enumerator. + + Generic enumerator + + + + Configuration of an artifact resolution service endpoint on an idp. + + + + + Index of the artifact resolution service endpoint. + + + + + Location of the endpoint. + + + + + Collection of certificate elements. + + + + + Create a new element of the right type. + + A new certificate element + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Config element for the signing certificate. + + + + + Allows local modification of the configuration for testing purposes + + + + + + File name of cert stored in file. + + + + + Store name to search. + + + + + Store location to search. + + + + + The search term used for searching the certificate store. + + + + + Find type, what field to search. + + + + + Load the certificate pointed to by this configuration. + + Certificate + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Ctor + + + + + Ctor + + Config element to load + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Honor the owin authentication mode even on logout. Normally the logout + handling is always done as if the middleware was active, to allow for + simple sign out without specifying an auth type. + + + + + Do not read the AuthnContext element in Saml2Response. + If you do not need these values to be present as claims in the generated + identity, using this option can prevent XML format errors (IDX13102) + e.g. when value cannot parse as absolute URI + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Handling logout requires access to the authenticated user session. If logout + is done over the POST binding, the session cookie must have SameSite=None + set (which is probably a bad idea). To avoid problems, disable logout + over POST in metadata by default. + + + + + SAML2 Specs says in section 4.4.4.2: + "... The responder MUST authenticate itself to the requester and ensure message integrity, either by signing the message or using a binding-specific mechanism." + + Unfortunately not all IDP seem to follow the specification. Disables requirement for a signed LogoutResponse. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + If an EntitiesDescriptor element is found when loading metadata + for an IdentityProvider, automatically check inside it if there + is a single EntityDescriptor and in that case use it. + + + + + Do not send logout state cookie, e.g. if you are not using ReturnUrl + or if you know the cookie will be lost due to cross-domain redirects + + + + + Ignore the check for the missing InResponseTo attribute in the Saml response. + This is different to setting the allowUnsolicitedAuthnResponse as it will only + ignore the InResponseTo attribute if there is no relayState. Setting + IgnoreMissingInResponseTo to true will always skip the check. + + + + + Collection of items with two sources: configured and loaded dyanically. + The dynamically loaded can reset while the configured are kept. + metadata. + + + + + Add a configured key. + + Key to add. + + + + Add a configured certificate. + + Certificate to add. + + + + Set the complete set of loaded items keys. Previously loaded items + are cleared, configured items remain. + + Items to set + + + + The loaded items. + + + + + Gets an enumerator to the combined set of keys. + + Enumerator + + + + Contact person for a SAML2 entity. + + + + + The type of this contact. A value from the + System.IdentityModel.Metadata.ContactType enumeration. + + + + + Name of the company of the contact. + + + + + Given name of the contact. + + + + + Surname of the contact. + + + + + Phone number of the contact. + + + + + E-mail of the contact. + + + + + Config collection of contacts. + + + + + Create a new element of the right type. + + A new ContactPersonElement. + + + + Get the key of an element. + + Element to get key of. + A guid. There is no support for removing items and we + want this to be unique. + + + + Get enumerator for the elements. + + + + + + Converts between string and EntityId, used by the configuration system to + allow configuration properties of type EntityId. + + + + + Converts a string to an EntityId + + Ignored + Ignored + String to convert + EntityID + + + + Config collection of federations. + + + + + Create new elemnt of the right type. + + FederationElement + + + + Get the key of an element, which is the metadata url. + + FedertionElement + + + + + Generic IEnumerable implementation. + + Enumerator + + + + Registers the identity providers from the configured federations in the identity provider dictionary. + + Current options. + + + + Configuration of a federation. + + + + + Location (url, local path or app relative path such as ~/App_Data) + where metadata is located. + + + + + Are unsolicited responses from the idps in the federation allowed? + + + + + Signing certificates for the federation + + + + + Config collection of IdentityProviderElements. + + + + + Create new element of right type. + + IdentityProviderElement + + + + Get the name of an element. + + IdentityProviderElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured identity providers in the dictionary of active idps. + + Current options. + + + + A thread safe wrapper around a dictionary for the identity providers. + + + First I thought about using a ConcurrentDictionary, but that does not maintain + any order of the added objects. Since the first idp added becomes the default idp, + the order must be preserved. And there has to be queuing semantics if the first idp + is dynamically loaded from a federation and later removed. Locks are simple and + this part of the code shouldn't be that performance sensitive. + + + + + Gets an idp from the entity id. + + entity Id to look up. + IdentityProvider + + + + Add an identity provider to the collection.. + + Identity provider to add. + + + + The default identity provider; i.e. the first registered of the currently known. + + + + + Gets all currently known identity providers. Note that the returned + enumeration is a copy to avoid race conditions. + + + + + Try to get the value of an idp with a given entity id. + + Entity id to search for. + The idp, if found. + True if an idp with the given entity id was found. + + + + Checks if there are no known identity providers. + + + + + Removes the idp with the given entity id, if present. If no such + entity is found, nothing is done. + + EntityId of idp to remove. + + + + Config element for the identity provider element. + + + + + Allows local modification of the configuration for testing purposes + + + + + + EntityId as presented by the idp. Used as key to configuration. + + + + + Destination url to send sign in requests to. + + + + + Single logout url endpoint of Idp. + + + + + The binding to use when sending requests to the Idp. + + + + + Certificate location for the certificate the Idp uses to sign its messages. + + + + + Signing algorithm for outbound messages to this Idp. Overrides the + main signature algorithm configured in . + + + + + Allow unsolicited responses. That is InResponseTo is missing in the AuthnRequest. + If true InResponseTo is not required. + If false InResponseTo is required. + Even though AllowUnsolicitedAuthnResponse is true the InResponseTo must be valid if existing. + + + + + Enable automatic downloading of metadata form the well-known uri (i.e. interpret + the EntityID as an uri and download metadata from it). + + + + + Metadata location url to be used for automatic downloading of metadata. + + + + + Artifact Resolution endpoints for the identity provider. + + + + + Does this Idp want the AuthnRequests to be signed? + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Indicates that the IDP sends the return url as part of the RelayState. + This is used when is enabled. + + + + + Root interface for the options objects, handling all configuration of + Saml2. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp list and the notifications. + + + + + Information about known identity providers. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Metadata configuration. + + + + + Used by tests to write-enable config. + + + + + Is the element contents read only? Always true in production, but + can be changed during tests. + + Is the element contents read only? + + + + Information about organization. + + + + + Optional attribute that describes for how long anyone may cache the metadata + presented by the service provider. Defaults to 1 hour. + + + + + How long after generation should the metadata be valid? + + + + + Collection of contacts. + + + + + Requested attributes of the service provider. + + + + + Metadata flag that we want assertions to be signed. + + + + + NamedId policy configuration element. + + + + + Allow create. + + + + + The NameId format. + + + + + Options implementation for handling in memory options. + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Reads the options from the current config file. + + Options object. + + + + Creates an options object with the specified SPOptions. + + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Available identity providers. + + + + + Information about the organization responsible for the entity. + + + + + Is this section readonly? + + Is this section readonly? + + + + Name of the organization. + + + + + Display name of the organization. + + + + + Url of the organization. + + + + + The language that should be used for the organization strings. + + + + + Config for a requested element in the SPs metadata. + + + + + Name of the attribute. Usually on the form urn:oid:.... + + + + + Friendly, human readable name of the attribute. + + + + + Format of the Name property, one of the standard Uris in the saml specification. + + + + + Is this attribute required by the SP for it to work correctly? + + + + + Collection of requested attributes that an SP wants in incoming assertions. + + + + + Create a new element of the right type. + + A new RequestedAttributeElement + + + + Get the key of an element. + + Element to get key of. + The name of the requested attribute. + + + + Get a generic enumerator to the collection. + + Generic enumerator + + + + Configuration of RequestedAuthnContext in generated AuthnRequests. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + AuthnContextClassRef. Either a full URL or the last word of a + standard URL. + + + + + Comparison mode of AuthnContextClassRef + + + + + Set of callbacks that can be used as extension points for various + events. + + + + + Notification called when a + has been created. The authenticationrequest can be amended and + modified. + + + + + Notification called when the SignIn command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the SignIn command is about to select + what Idp to use for the request. The EntityId is the one supplied + (e.g. through query string). To select a specicic IdentityProvider + simply return it. Return null to fall back to built + in selection. + + + + + Notification called to decide if a SameSite=None attribute should + be set for a cookie. The default implementation is based on the pseudo + code in https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/ + More covering code can be found at + https://www.chromium.org/updates/same-site/incompatible-clients but that cannot + be shipped with the library due to the license. + + + + + Notification called when the logout command is about to use the + StoredRequestState derived from the request's RelayState data. + Return a different StoredRequestState if you would like to customize the + RelayState lookup. + + + + + Notification called when a command is about to construct a fully-qualified url + Return a non-null Uri if you need to override this per request. Otherwise + it will fall back to the normal logic that checks the request Uri + and the SPOptions.PublicOrigin setting + + + + + Notification called when single logout status is returned from IDP. + Return true to indicate that your notification has handled this status. Otherwise + it will fall back to the normal status processing logic. + + + + + Get a binding that can unbind data from the supplied request. The + default is to use + + + + + Notification called when the command has extracted data from + request (by using ) + + + + + Notification called when the ACS command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when the Logout command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called when a logout request is created to initiate single log + out with an identity provider. + + + + + Notification called when a logout request has been transformed to an XML node tree. + + + + + Notification called when a logout request has been received and processed and a Logout Response has been created. + + + + + Notification called when metadata has been created, but before + signing. At this point the contents of the metadata can be + altered before presented. + + + + + Notification called when the Metadata command has produced a + , but before anything has been applied + to the outgoing response. Set the + flag to suppress the library's built in apply functionality to the + outgoing response. + + + + + Notification called by the SignIn and Logout commands to validate a ReturnUrl that is not relative. + Return true to indicate that you accept the ReturnUrl, false otherwise. + Default validation do not accept any absolute URL. + When false is returned, the SignIn and Logout commands will throw an . + + + + + Notification called when getting an identity provider. Default version is to return + the given idp from Options.IdentityProviders. + + + + + Callbacks that allow modifying the validation behavior in potentially unsafe/insecure ways + + + + + Callbacks that allow modification of validation behavior in potentially unsafe/insecure ways + + + + + Notification called when the token handler has populated the + . Modify it's properties to customize + the generated validation parameters. + + + + + Notification called when an incoming Saml Response contains an unexpected + InResponseTo value. Return true to acceppt the message despite this. + + This notification has been added to aid in troubleshooting a + hard-to-track-down issue. It will be removed in a future release if a + better solution is identified thanks to the added production analysis + that this enables. + + + + Certificates used by the service provider for signing, decryption and + TLS client certificates for artifact resolve. + + + + + Add a certificate to the collection with default status use and + metadata behaviour. + + Certificate to add. + + + + Add to the collection at the specified position. + + Position index. + Service certificate to add. + + + + Config element for the service certificate element. + + + + + Is this certificate for current or future use? + + + + + Intended use of the certificate + + + + + How should we override the metadata publishing rules? + + + + + Config collection of ServiceCertificateElements. + + + + + Create new element of right type. + + ServiceCertificateElement + + + + Get the name of an element. + + ServiceCertificateElement + element.Name + + + + Get a strongly typed enumerator. + + Strongly typed enumerator. + + + + Register the configured service certificates. + + Current options. + + + + Signing behavior for requests. + + + + + Sign authnrequests if the idp is configured for it. This is the + default behavior. + + + + + Always sign AuthnRequests. AuthnRequestsSigned is set to true + in metadata. + + + + + Never sign AuthnRequests. + + + + + Options for the service provider's behaviour; i.e. everything except + the idp and federation list. + + + + + Ctor + + + + + Construct the options from the given configuration section + + + + + + Return Uri to redirect the client to, if no return uri was specified + when initiating the signin sequence. + + + + + Recommendation of cache refresh interval to those who reads our + metadata. + + + + + Maximum validity duration after fetch for those who reads our + metadata. Exposed as an absolute validUntil time in the metadata. + If set to null, no validUntil is exposed in metadata. + + + + + The security token handler used to process incoming assertions for this SP. + The default value is to lazy create one using the current EntityId. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + Application root relative path for Saml2 endpoints. The + default is "/Saml2". + + + + + By default, the service provider uses the host, protocol, port and + application root path from the HTTP request when creating links. + This might not be accurate in reverse proxy or load-balancing + situations. You can override the origin used for link generation + for the entire application using this property. To override per request, + implement a GetPublicOrigin Notification function. + + + + + Metadata describing the organization responsible for the entity. + + + + + NameId Policy. + + + + + RequestedAuthnContext + + + + + Collection of contacts for the SAML2 entity. + + + + + Collection of attribute consuming services for the service provider. + + + + + Certificates used by the service provider for signing or decryption. + + + + + Certificates valid for use in decryption + + + + + Certificate for use in signing outbound requests + + + + + Certificates to be published in metadata + + + + + Signing behaviour for AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Metadata flag that we want assertions to be signed. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Minimum accepted signature algorithm for any incoming messages. + + + + + Adapter to logging framework of hosting application. + + + + + Template for token validation parameters. Some security critical validation + parameters are set for each use. The Unsafe.TokenValidationParametersCreated notification + is called after those are set if those need to be overriden. + + + + + Config section for the module. + + + + + Used for testing, always returns true in production. + + Returns true (unless during tests) + + + + Current config as read from app/web.config. + + + + + EntityId - The identity of the ServiceProvider to use when sending requests to Idp + and presenting the SP in metadata. + + + + + The Url to redirect back to after successfull authentication. + + + + + By default, the service provider uses the host, protocol, and port + from the HTTP request when creating links. This might not be + accurate in reverse proxy or load-balancing situations. You can + override the origin used for link generation using this property. + + + + + Set of identity providers known to the service provider. + + + + + Set of federations. The service provider will trust all the idps in these federations. + + + + + Url to discovery service to use if no idp is specified in the sign in call. + + + + + Application root relative path for Saml2 endpoints. The + default is "Saml2". + + + + + NamedId policy element. + + + + + RequestedAuthnContext config. + + + + + Metadata describing the organization responsible for the entity. + + + + + Metadata of the service provider. + + + + + Contacts for the SAML2 entity. + + + + + Attribute consuming services. + + + + + Certificates used by the service provider for signing and/or decryption. + + + + + Signing behavior for created AuthnRequests. + + + + + Signing algorithm for metadata and outbound messages. Can be + overriden for each . + + + + + Weakest accepted signing algorithm for inbound messages. + + + + + Validate certificates when validating signatures? Normally not a + good idea as SAML2 deployments typically exchange certificates + directly and instead of relying on the public certificate + infrastructure. + + + + + Compatibility settings. Can be used to make Saml2 accept + certain non-standard behaviour. + + + + + Helper methods for DateTime formatting. + + + + + Format a datetime for inclusion in SAML messages. + + Datetime to format. + Formatted value. + + + + A SAML response was found, but could not be parsed due to formatting issues. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Exception thrown when an signature is not valid according to the + SAML standard. + + + + + Default ctor + + + + + Ctor + + Message of exception + + + + Ctor + + Message + Inner exception + + + + Serialization Ctor + + Serialization info + Serialization context + + + + No saml response was found in the http request. + + + + + Default Ctor, setting message to a default. + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Base class for authentication services specific exceptions, that might + require special handling for error reporting to the user. + + + + + Default Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed validation. + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + A SAML2 Response failed InResponseTo validation because RelayState is lost, or an unsolicited response contains an InResponseTo + + + + + Ctor + + + + + Ctor + + Message of the exception. + + + + Ctor + + Message of the exception. + Inner exception. + + + + Serialization Ctor + + Serialization info + Serialization context + + + + Extended exception containing information about the status and status message SAML response. + + + + + Status of the SAML2Response + + + + + Status message of SAML2Response + + + + + Second level status of SAML2Response + + + + + Ctor, bundling the Saml2 status codes and message into the exception message. + + Exception message. + Status of the SAML2Response + Status message of SAML2Response + Second level status of SAML2Response + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Represents a federation known to this service provider. + + + + + Ctor + + Config to use to initialize the federation. + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + Ctor + + Location (url, local path or app + relative path such as ~/App_Data) where metadata is located. + Should unsolicited responses + from idps in this federation be accepted? + Options to pass on to created IdentityProvider + instances and register identity providers in. + List of signing keys to use to validate metadata. + + + + For how long is the metadata that the federation has loaded valid? + Null if there is no limit. + + + + + Signing keys to use to verify the metadata before using it. + + + + + Permitted cache duration for the metadata. + + + + + Valid until + + + + + Represents a known identity provider that this service provider can communicate with. + + + + + Ctor + + Entity id of the identityprovider. + Service provider options to use when + creating AuthnRequests for this Idp. + + + + Should this idp load metadata? The metadata is loaded immediately + when the property is set to true, so the + must be correct before settingLoadMetadata to true. + + + + The binding used when sending AuthnRequests to the identity provider. + + + + + The Url of the single sign on service. This is where the browser is redirected or + where the post data is sent to when sending an AuthnRequest to the idp. + + + + + Artifact resolution endpoints on the idp. + + + + + The Url of the single sign out service. This is where the browser + is redirected or where the post data is sent to when sending a + LogoutRequest to the idp. + + + + + The Url to send single logout responses to. Defaults to + SingleLogoutServiceUrl. + + + + + Binding for the Single logout service. If not set, returns the + same as the main binding (used for AuthnRequests) + + + + + The Entity Id of the identity provider. + + + + + Is this idp allowed to send unsolicited responses, i.e. idp initiated sign in? + + + + + Does the RelayState contains the return url?, + This setting is used only when the AllowUnsolicitedAuthnResponse setting is enabled. + + + + + Location of metadata for the Identity Provider. Automatically enables + . The location can be a URL, an absolute + path to a local file or an app relative path + (e.g. ~/App_Data/IdpMetadata.xml). By default the entity id is + interpreted as the metadata location (which is a convention). + + + + + Create an authenticate request aimed for this idp. + + Urls for Saml2, used to populate fields + in the created AuthnRequest + + + + Signing Algorithm to be used when signing oubound messages. + + + + + Bind a Saml2 message using the active binding of the idp, + producing a CommandResult with the result of the binding. + + + This overload does not support the usage of Xml Created notifications. + + The Saml2 message to bind. + CommandResult with the bound request. + + + + Bind a Saml2 message using the active binding of hte idp, + producing a CommandResult with the result of the binding. + + Type of the message. + The Saml2 message to bind. + Notification to call with Xml structure + CommandResult with the bound message. + + + + The public key of the idp that is used to verify signatures of responses/assertions. + + + + + Reads the supplied metadata and sets all properties of the + IdentityProvider based on the metadata. + + Metadata to read. + + + + Validity time of the metadata this idp was configured from. Null if + idp was not configured from metadata. + + + + + Does this Idp want the AuthnRequests signed? + + + + + Create a logout request to the idp, for the current identity. + + + + + + Disable outbound logout requests to this idp, even though + Saml2 is configured for single logout and the idp supports + it. This setting might be usable when adding SLO to an existing + setup, to ensure that everyone is ready for SLO before activating. + + + + + Interface for an adapter around the logging framework used on each + platform. + + + + + Write informational message. + + Message to write. + + + + Write an error message + + Message + Exception to include in error message. + + + + Write an informational message on the verbose level. + + Message to write + + + + SymmetricAlgorithm decrypting implementation for http://www.w3.org/2009/xmlenc11#aes128-gcm. + This is class is not a general implementation and can only do decryption. + + + + + A WebClient implementation that will add a list of client + certificates to the requests it makes. + + + + + Register the certificate to be used for this requets. + + Certificates to offer to server + + + + Override the base class to add the certificate + to the reuqest before returning it. + + + + + + + Helpers for delimited string, with support for escaping the delimiter + character. + + + + + Join strings with a delimiter and escape any occurence of the + delimiter and the escape character in the string. + + Strings to join + Joined string + + + + Split strings delimited strings, respecting if the delimiter + characters is escaped. + + Joined string from + Unescaped, split strings + + + + Class to help with mapping virtual paths relative to the server. + + + + + Returns the base path of the website or application running. + + + + + Maps a virtual path to the BasePath of the running appliction. + + The virtual path that needs to mapped relative to the server. + A file path. + + + + Determines if a virtual path is relative or not. + + The path that is to be tested. + True if the path is relative otherwise false. + + + + Determines if a url is relative to current host, excluding protocol-relative addresses + + The path that is to be tested. + True if the url is relative otherwise false. + + + + Class implements static methods to help parse a query string. + + + + + Splits a query string into its key/value pairs. + + A query string, with or without the leading '?' character. + A collecktion with the parsed keys and values. + + + + AES-GCM Nonce size defined in https://www.w3.org/TR/xmlenc-core1/#sec-AES-GCM + + + + + Crypto description for a Managed implementation of SHA256 signatures. + + + + + Ctor + + + + + Create a deformatter + + Key + Deformatter + + + + Create a formatter + + Key + Formatter + + + + How should we override the metadata publishing rules + + + + + No override. Published according to the normal rules. + + + + + Publish as Unspecified + + + + + Publish as Encryption + + + + + Publish as Signing + + + + + Do not publish + + + + + Metadata for an attribute consuming service. + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Is the service required? + + + + + The name of the attribute consuming service. + + + + + Description of the attribute consuming service + + + + + Requested attributes. + + + + + Use this instance for reading metadata. It uses custom extensions + to increase feature support when reading metadata. + + + + + An indexed entry with an optional default + + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + A collection of indexed entries with support for getting the + configured default entry + + The type stored in the collection + + + + Index of the endpoint + + + + + Is this the default endpoint? + + + + + Extensions for Metadatabase. + + + + + Use a MetadataSerializer to create an XML string out of metadata. + + Metadata to serialize. + Certificate to sign the metadata + with. Supply null to not sign. + Algorithm to use when signing. + + + + Helper for loading SAML2 metadata + + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + EntityDescriptor containing metadata + + + + Load and parse metadata. + + Path to metadata. A Url, absolute + path or an app relative path (e.g. ~/App_Data/metadata.xml) + If the metadata contains + an EntitiesDescriptor, try to unpack it and return a single + EntityDescriptor inside if there is one. + EntityDescriptor containing metadata + + + + Load and parse metadata for a federation. + + Url to metadata + Extended entitiesdescriptor + + + + Load and parse metadata for a federation. + + Url to metadata + + Validate the certificate when doing + signature validation. Normally a bad idea with SAML2 as certificates + are not required to be valid but are only used as conventient carriers + for keys. + Mininum strength accepted + for signing algorithm. + Extended entitiesdescriptor + + + + Specifies an attribute requested by the service provider. + + + + + Ctor + + Name of the attribute. + + + + Ctor + + Name of the attribute. + Value of the attribute. + + + + Is this attribute required by the service provider? + + + + + Uri used for NameFormat to specify that the Name is a Uri. + + + + + Uri used for NameFormat to specify that the format of the Name + is unspecified. + + + + + Uri used for NameFormat to specify that the format of the Name + fulfills the standard's basic requirements. + + + + + Extensions for NameIdFormat enum. + + + + + Get the full Uri for a NameIdFormat. + + NameIdFormat to get Uri for + Uri + + + + Logger adapter that does nothing. + + + + + Write an error message + + Message + Exception to include in error message. + + + + Write informational message. + + Message to write. + + + + Write an informational message on the verbose level. + + Message to write + + + + Generator of secure random keys.. + + + + + Create a unique random string with a cryptographically secure + random function. + + Random string 56-chars string + + + + Create a unique random array with a cryptographically secure + random function. + + 20 random bytes. + + + + Simple default implementation of detection of browsers/devices not compatible with + the SameSite=None cookie attribute. + Based on https://docs.microsoft.com/en-us/aspnet/core/security/samesite?view=aspnetcore-3.1 + + + + + Should a SameSite=None cookie attribute be emitted? + + User Agent string + True if SameSite=None should be emitted. + + + + Extension methods for Saml2Assertion + + + + + Writes out the assertion as an XElement. + + The assertion to create xml for. + XElement + + + + Claim type constants. + + + + + Session index is set by the idp and is used to correlate sessions + during single logout. + + + + + Original subject name identifier from the SAML2 idp, that should + be logged out as part of a single logout scenario. + + + + + Extension methods for Saml2Condition + + + + + Writes out the conditions as an XElement. + + Conditions to create xml for. + XElement + + + + Extension methods for Saml2NameId + + + + + Create XElement for the Saml2NameIdentifier. + + + + + + + SAML2 namespace constants. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace of the SAML2 protocol. + + + + + Namespace Uri of Saml2 protocol. + + + + + Namespace of SAML2 assertions. + + + + + Namespace of SAML2 assertions. + + + + + Namespace Uri of SAML2 assertions. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace of SAML2 Metadata. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for idp discovery protocol extension. + + + + + Namespace for Xml schema instance. + + + + + Namespace for Soap envelope. + + + + + Namespace for Soap envelope. + + + + + Comparison setting for RequestedAuthnContext, see SAML2 Core spec 3.3.2.2.1. + + + + + Exact match is required. This is the default. + + + + + The resulting AuthnContext must be at least as strong as the + specified classRef. + + + + + The resulting AuthnContext must be at most as strong as the + specified classRef. + + + + + The resulting AuthnContext must be better than the specified + classRef. The classRef specified is thus not permitted. + + + + + Wraps a and generates a signature automatically when the envelope + is written completely. By default the generated signature is inserted as + the last element in the envelope. This can be modified by explicitly + calling WriteSignature to indicate the location inside the envelope where + the signature should be inserted. + + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + if is null. + if is null. + if is null or Empty. + + + + Initializes an instance of . The returned writer can be directly used + to write the envelope. The signature will be automatically generated when + the envelope is completed. + + Writer to wrap/ + SigningCredentials to be used to generate the signature. + The reference Id of the envelope. + inclusive prefix list to use for exclusive canonicalization. + if is null. + if is null. + if is null or Empty. + + + + Gets or sets the to use. + + if value is null. + + + + Calculates and inserts the Signature. + + + + + Sets the position of the signature within the envelope. Call this + method while writing the envelope to indicate at which point the + signature should be inserted. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class implementation. When the last element of the envelope is written + the signature is automatically computed over the envelope and the signature is inserted at + the appropriate position, if WriteSignature was explicitly called or is inserted at the + end of the envelope. + + + + + Overrides the base class. Writes the specified start tag and associates + it with the given namespace. + + The namespace prefix of the element. + The local name of the element. + The namespace URI to associate with the element. + + + + Releases the unmanaged resources used by the System.IdentityModel.Protocols.XmlSignature.EnvelopedSignatureWriter and optionally + releases the managed resources. + + + True to release both managed and unmanaged resources; false to release only unmanaged resources. + + + + + Common properties of all Saml2 message implementations (both requests + and responses). There is no corresponding definition in the SAML2 + standard, so this is made up of the common fields of 3.2.2 Complex Type + StatusResponseType (the base type for all responses) and of 3.2.1 Complex + Type RequestAbstractType. + + + + + The destination of the message. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Issuer of the message. + + + + + Serializes the message into wellformed XML. + + Saml2 message to transform to XML + Notification allowing modification of XML tree before serialization. + string containing the Xml data. + + + + The NameId Format. + + + + + No NameId format has been configured. No format will be included + in AuthnRequests and metadata. + + + + + 8.3.1 Unspecified + + + + + 8.3.2 Email Address + + + + + 8.3.3 X.509 Subject Name + + + + + 8.3.4 Windows Domain Qualified Name + + + + + 8.3.5 Kerberos Principal Name + + + + + 8.3.6 Entity Identifier + + + + + 8.3.7 Persistent Identifier + + + + + 8.3.8 Transient Identifier + + + + + Artifact resolution request, corresponds to section 3.5.1 in SAML + core specification. + + + + + Artifact to resolve. + + + + + The SAML2 request name + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 ArtifactResponse message as specified in SAML2 Core 3.5.2. + + + + + Ctor + + Parsed XML with message. + + + + Contained message. + + + + + Status code of the Artifact response. + + + + + An authentication request corresponding to section 3.4.1 in SAML Core specification. + + + + + Default constructor + + + + + The SAML2 request name + + + + + Serializes the request to a Xml message. + + XElement + + + + Serializes the message into wellformed Xml + + string containing the Xml data. + + + + Read the supplied Xml and parse it into a authenticationrequest. + + xml data. + Relay State attached to the message or null if not present. + Saml2Request + On xml errors or unexpected xml structure. + + + + Ctor + + Xml data + RelayState associateed with the message. + + + + The assertion consumer url that the idp should send its response back to. + + + + + Index to the SP metadata where the list of requested attributes is found. + + + + + Scoping for request + + + + + NameId policy. + + + + + RequestedAuthnContext. + + + + + Binding type to request the Idp to use when responding. + + + + + Sets whether request should force the idp to authenticate the presenter directly, + rather than rely on a previous security context. + If false, the ForceAuthn parameter is omitted from the request. + If true, the request is sent with ForceAuthn="true". + + + + + Sets whether request should request for SAML Passive login if possible, + If false, the IsPassive parameter is omitted from the request. + If true, the request is sent with IsPassive="true". + + + + + The Saml2IdPEntry specifies a single identity provider trusted by the + requester to authenticate the presenter + + + + + Initializes a new instance of the class. + + The provider identifier. + + + + A URI reference representing the location of a profile-specific + endpoint supporting the authentication request protocol. The + binding to be used must be understood from the profile of use. + + + + + A human-readable name for the identity provider. + + + + + The Entity Id of the Identity Provider. Cannot be null. + + + + + Create XElement for the Saml2IdPEntry. + + + + + A Saml2 LogoutRequest message (SAML core spec 3.7.1) + + + + + Ctor + + + + + Ctor + + Id of message. + + + + Create Saml2LogoutRequest from data in Xml. + + Xml data to initialize the Saml2LogoutRequest from. + + + + The SAML2 request name + + + + + Name id to logout. + + + + + Session index to logout. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + A Saml2 Logout Response. + + + + + Ctor + + Status of the response. + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Appends xml for the Saml2LogoutResponse to the given parent node. + + Xml for the Saml2LogoutResponse is appended + to the children of this node. + + + + Load values into Saml2LogoutResponse from passed xml element + + XmlElement containing a LogoutResponse + Saml2LogoutResponse + + + + The NameId policy. + + The class is used in created AuthnRequests, so it is + immutable to avoid unintended changes. + + + + Ctor + + + + + + + Value of AllowCreate attribute. Set to null to omit. + + + + + The NameId format. + + + + + Somewhat ugly subclassing to be able to access some methods that are protected + on Saml2SecurityTokenHandler. The public interface of Saml2SecurityTokenHandler + expects the actual assertion to be signed, which is not always the case when + using Saml2-P. The assertion can be embedded in a signed response. Or the signing + could be handled at transport level. + + + + + Process authentication statement from SAML assertion. WIF chokes if the authentication statement + contains a DeclarationReference, so we clear this out before calling the base method + http://referencesource.microsoft.com/#System.IdentityModel/System/IdentityModel/Tokens/Saml2SecurityTokenHandler.cs,1970 + + Authentication statement + Claim subject + Assertion Issuer + + + + Reads a <saml:Assertion> element. + + A positioned at a element. + if is null. + if assertion is encrypted. + If is not positioned at a Saml2Assertion. + If Version is not '2.0'. + If 'Id' is missing.> + If 'IssueInstant' is missing.> + If no statements are found.> + A instance. + + + + Base class for saml requests, corresponds to section 3.2.1 in SAML Core specification. + + + + + The id of the request. + + + + + Version of the SAML request. Always returns "2.0" + + + + + The instant that the request was issued (well actually, created). + + + + + SAML message name for requests - hard coded to SAMLRequest. + + + + + The destination of the request. + + + + + The issuer of the request. + + + + + The additional content to append within an Extensions element. + + + + + The SAML2 request name + + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Creates XNodes for the fields of the Saml2RequestBase class. These + nodes should be added when creating XML out of derived classes. + + + + + + Reads the request properties present in Saml2RequestBase + Also validates basic properties of the request + + The xml document to parse + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + RelayState attached to the message. + + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Configuration of RequestedAuthnContext + + + + + Ctor + + Config element to load. + + + + Ctor + + AuthnContextClassRef + Comparison + + + + Authentication context class reference. + + + + + Comparison method. + + + + + Represents a SAML2 response according to 3.3.3. The class is immutable (to an + external observer. Internal state is lazy initiated). + + + + Holds all assertion element nodes + + + + Read the supplied Xml and parse it into a response. + + xml data. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Saml2Response + On xml errors or unexpected xml structure. + + + + Read the supplied Xml and parse it into a response. + + xml data. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + Saml2Response + On xml errors or unexpected xml structure. + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + Service provider settings used when validating Saml response + + + + Ctor + + Root xml element. + The expected value of the + InReplyTo parameter in the message. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + response. Each identity is translated into a separate assertion. + + + + Create a response with the supplied data. + + Issuer of the response. + The certificate to use when signing + this response in XML form. + The destination Uri for the message + In response to id + RelayState associated with the message. + Claims identities to be included in the + Audience of the response, set as AudienceRestriction + response. Each identity is translated into a separate assertion. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + The response as an xml element. Either the original xml, or xml that is + generated from supplied data. + + + + + Transforms the message to an XElement object tree. + + This operation is inefficient, but it is only used by + the StubIdp so it's acceptable. + XElement with Xml representation of the message + + + + SAML Message name for responses, hard coded to SAMLResponse. + + + + + string representation of the Saml2Response serialized to xml. + + string containing xml. + + + + Id of the response message. + + + + + Expected InResponseTo as extracted from + + + + + InResponseTo id. + + + + + Issue instant of the response message. + + + + + Status code of the message according to the SAML2 spec section 3.2.2.2 + + + + + StatusMessage of the message according to the SAML2 spec section 3.2.2.1 + + + + + Optional status which MAY give additional information about the cause of the problem (according to the SAML2 spec section 3.2.2.2))))))))). + Because it may change in future specifications let's not make enum out of it yet. + + + + + Issuer (= sender) of the response. + + + + + The destination of the response message. + + + + Gets all assertion element nodes from this response message. + All assertion element nodes. + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + ClaimsIdentities + + + + Extract claims from the assertions contained in the response. + + Service provider settings used when processing the response into claims. + Relay data stored when creating AuthnRequest, to be passed on to + GetIdentityProvider notification. + ClaimsIdentities + + + + RelayState attached to the message. + + + + + Session termination time for a session generated from this + response. + + + + + Saml2Scoping specifies a set of identity providers trusted by the + requester to authenticate the presenter, as well as limitations and + context related to proxying of the authentication request message to + subsequent identity providers by the responder. + + + + + Gets advisory list of identity providers and associated information + that the requester deems acceptable to respond to the request. + + + + + Fluent config helper that adds a to the + + + Idp entry to add + this + + + + Specifies the number of proxying indirections permissible between + the identity provider that receives the authentication request and + the identity provider who ultimately authenticates the principal. + A count of zero permits no proxying, while omitting (null) this + attribute expresses no such restriction. + + + + + Gets or sets the set of requesting entities on whose behalf the + requester is acting. Used to communicate the chain of requesters + when proxying occurs. + + + + + Fluent config helper that adds a requester id to the + + + Requester Id to add + this + + + + Create XElement for the Saml2Scoping. + + + + + Saml2 Soap binding implementation. + + + This class does not follow the pattern of the other three bindings + (Redirect, POST and Artifact) because it does not use the front channel + with messages being passed over the user's browser. + + + + + Create a SOAP body around a specified payload. + + Payload of the message. + + + + + Extract the body of a SOAP message. + + xml data + Parsed data. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Response. + + + + Send a SOAP request to the specified endpoint and return the result. + + Message payload + Destination endpoint + Client certificates to offer to the server. + Response. + + + + Status codes, mapped against states in section 3.2.2.2 in the SAML2 spec. + + + + + Success. + + + + + Error because of the requester. + + + + + Error because of the responder. + + + + + Versions doesn't match. + + + + + The responding provider was unable to successfully authenticate the principal + + + + + Unexpected or invalid content was encountered within a saml:Attribute or saml:AttributeValue element. + + + + + The responding provider cannot or will not support the requested name identifier policy. + + + + + The specified authentication context requirements cannot be met by the responder. + + + + + Used by an intermediary to indicate that none of the supported identity provider Loc elements in + an IDPList can be resolved or that none of the supported identity providers are available. + + + + + Indicates the responding provider cannot authenticate the principal passively, as has been requested. + + + + + Used by an intermediary to indicate that none of the identity providers in an IDPList are supported by the intermediary. + + + + + Used by a session authority to indicate to a session participant that it was not able to propagate logout to all other session participants. + + + + + Indicates that a responding provider cannot authenticate the principal directly and is not permitted to proxy the request further. + + + + + The SAML responder or SAML authority is able to process the request but has chosen not to + respond. This status code MAY be used when there is concern about the security context of the + request message or the sequence of request messages received from a particular requester. + + + + + The SAML responder or SAML authority does not support the request. + + + + + The SAML responder cannot process any requests with the protocol version specified in the request. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is a major upgrade from the highest protocol version supported by the responder. + + + + + The SAML responder cannot process the request because the protocol version specified in the + request message is too low. + + + + + The resource value provided in the request message is invalid or unrecognized. + + + + + The response message would contain more elements than the SAML responder is able to return. + + + + + An entity that has no knowledge of a particular attribute profile has been presented with an attribute + drawn from that profile. + + + + + The responding provider does not recognize the principal specified or implied by the request. + + + + + The SAML responder cannot properly fulfill the request using the protocol binding specified in the + request. + + + + + Abstract Saml2 StatusResponseType class. + + + + + Ctor + + Status of the response + + + + The destination of the message. + + + + + Issuer of the message. + + + + + Id of request message, if this message is a response to a previous + request. + + + + + The name of the message to use in a query string or form input + field. Typically "SAMLRequest" or "SAMLResponse". + + + + + RelayState attached to the message. + + Strictly speaking, this is not part of the message, + but it is delivered together with the message so we need to keep + track of it together with a message. + + + + Certificate used to sign the message with during binding, according + to the signature processing rules of each binding. + + + + + The signing algorithm to use when signing the message during binding, + according to the signature processing rules of each binding. + + The signing algorithm. + + + + Status code of the message. + + + + + Id of the message. + + + + + Issue instant. + + + + + Serializes the message into wellformed Xml. + + string containing the Xml data. + + + + Transforms the message to an XElement object tree. + + XElement with Xml representation of the message + + + + Extension methods for Saml2Statement + + + + + Writes out the statement as an XElement. + + Statement to create xml for. + XElement + + + + Extension methods for Saml2Subject + + + + + Writes out the subject as an XElement. + + The subject to create xml for. + XElement + + + + Writes out the subject confirmation as an XElement. + + + + + + + + Writes out the subject confirmation data as an XElement. + + + + + + + + Service Certificate definition + + + + + Ctor + + + + + Ctor for loading from configuration + + + + + + X509 Certificate + + + + + Is this certificate for current or future use? + + + + + What is the intended use of this certificate. + + + + + How should we override the metadata publishing rules? + + + + + Stored data for pending requests. + + + + + Start of the cookie name for state preservation. + + + + + Ctor + + The EntityId of the IDP the request was sent to + The Url to redirect back to after a succesful login + ID of the SAML message, used to match InResponseTo + Aux data that can be stored across the authentication request. + + + + The IDP the request was sent to + + + + + The Url to redirect back to after a succesful login + + + + + Message id of the originating Saml message. Should match InResponseTo + in the response. + + + + + Aux data that need to be preserved across the authentication call. + + + + + Get a serialized representation of the data. + + Serialized data + + + + Ctor that restores a StoredRequestState object from serialized + representation. + + data buffer + + + + The level of trust that a certain piece of data comes with. + + + + + The data cannot be trusted at all. + + + + + The data was retreived through a request that was initiated from + our end, but there was no transport protection. + + + + + The data was retrevied through TLS protected request that was + initaited from our end, to a host that had a valid TLS certificate. + + + + + The data was signed and have been verified by a signing key. + + + + + Data is from a local configuration source. E.g. metadata or a + certificate loaded from disk. + + + + + Represents the assertion consumer service command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.AcsCommandName). + + + + + Run the command, initiating or handling the assertion consumer sequence. + + Request data. + Options + CommandResult + + + + Reimplementation of System.Web.HttpCacheability. + + + + + Value is not initialized and probably a mistake. + + + + + Sets the Cache-Control: no-cache header. + + + + + The default value. Sets the cache control to "private". + + + + + Specifies that the response is cached only at the origin server. + + + + + Will disallow anyone but the server to cache the result. + + + + + Sets the Cache-Control to public. + + + + + The response is cached in the client and the server but nowhere else. + + + + + Factory to create the command objects thand handles the incoming http requests. + + + + + The name of the Assertion Consumer Service Command. + + + + + The name of the Sign In Command. + + + + + The name of the Log Out Command. + + + + + The metadata command has no name - it is triggered at base url for + Saml2. + + + + + Gets a command for a command name. + + Name of a command. Probably a path. A + leading slash in the command name is ignored. + A command implementation or notFoundCommand if invalid. + + + + The results of a command. + + + + + Status code that should be returned. + + + + + Cacheability of the command result. + + + + + Location, if the status code is a redirect. + + + + + The extracted principal if the command has parsed an incoming assertion. + + + + + Session termination time. Priority order: 1. SessionNotOnOrAfter in + assertion. 2. WIF configured lifetime with SessionSecurityTokenHandler + 3. SessionSecurityTokenHandler default. + + + + + The response body that is the result of the command. + + + + + The Mime-type + + + + + Data relayed from a previous request, such as the dictionary storing + the Owin Authentication Properties. + + + + + Indicates that the local session should be terminated. Used by + logout functionality. + + + + + Name of cookie to set. + + + + + Value of the "Secure" flag for the cookie (relevant if != null). + + + + + SAML RelayState value + + + + + Request state to store so that it is available on next http request. + + + + + Serialized request state. + + + + + Name of cookie to be cleared. + + + + + Ctor + + + + + Can be set by a notification callback to indicate that the + has been handled and should not + be applied by the Saml2 library to the response. + + + + + Other headers that should be set on the response. + + + + + The data of a http request that Saml2 needs to handle. A separate DTO is used + to make the core library totally independent of the hosting environment. + + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Cookies of request + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Ctor + + Http method of the request + Full url requested + Form data, if present (only for POST requests) + Path to the application root + Function that reads cookie if it exists + Function that decrypts cookie + contents to clear text. + Claims Principal associated with the request + + + + Escape a Base 64 encoded cookie value, matching the unescaping + that is done in the ctor. + + Data to escape + Escaped data + + + + The http method of the request. + + + + + The complete Url of the request. + + + + + The form data associated with the request (if any). + + + + + The query string parameters of the request. + + + + + The root Url of the application. This includes the virtual directory + that the application is installed in, e.g. http://hosting.example.com/myapp/ + + + + + RelayState from SAML message + + + + + Request state from a previous call, carried over through cookie. + + + + + User (if any) associated with the request + + + + + A command - corresponds to an action in Mvc. + + + + + Run the command and return a result. + + The http request that the input + data can be read from. + The options to use when performing the command. + The results of the command, as a DTO. + + + + Represents the logout command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.LogoutCommandName). + + + + + Run the command, initiating or handling the logout sequence. + + Request data. + Options + CommandResult + + + + Run the command, initating or handling the logout sequence. + + Request data. + Path to return to, only used if this + is the start of an SP-initiated logout. + Options + CommandResult + + + + Initiatiate a federated logout. + + Request data + Return url to redirect to after logout + optins + Terminate local session as part of signout? + + + + + Represents the service provider metadata command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.MetadataCommandName). + + + + + Run the command, creating and returning the service provider metadata. + + Request data. + Options + CommandResult + + + + Represents a missing command. + Instances of this class are returned by CommandFactory.GetCommand(...) + when the specified command name is not recognised. + + + + + Run the command, returning a CommandResult specifying an HTTP 404 Not Found status code. + + Request data. + Options + CommandResult + + + + Saml2 Artifact binding. + + + + + + + + + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + Options used to look up details of issuing + idp when needed (artifact binding). + True if the binding supports the current request. + + + + Create a SAML artifact value. + + Entity id of the artifact issuer. + Index of the artifact resolution endpoint + that the requester should use to resolve the artifact. + + + + Binds a message to a http response with HTTP Redirect. + + Message to bind. + Logger to use. + CommandResult. + + + + Pending messages where the artifact has been sent. + + + + + The result of a Saml2Binding.UnBind. + + + + + Ctor + + The data payload + The associated relay state. + Level of trust that can be put in data. + Does not care about any signature included in the data. + + + + The data payload. + + + + + The associated relay state, if any. Otherwise null. + + + + + Trust level indicating how much the message contents can be + trusted. + + + + + Abstract base for all Saml2Bindings that binds a message to a specific + kind of transport. + + + + + Uri identifier of the HTTP-POST binding. + + + + + Uri identifier of the HTTP-Redirect binding. + + + + + Uri identifier of the HTTP-Artifact binding. + + + + + Uri identifier of the Discovery Response SAML extension. + + + + + Uri identifier of the SOAP binding. + + + + + Binds a message to a http response. + + Message to bind. + Logger to log use, can be null. + CommandResult. + + + + Binds a message to an http response. + + Type of the message. + Message to bind + Logger to log use, can be null. + Notification to call for modification of XDocument, can be null. + CommandResult. + + + + Binds a message to a http response. + + Message to bind. + CommandResult. + + + + Extracts a message out of the current HttpRequest. + + Current HttpRequest. + Options, used to look up certificate information + in bindings that validate signatures. If set to null, the returned + result will have TrustLevel.None. + Extracted message. + + + + Checks if the binding can extract a message out of the current + http request. + + HttpRequest to check for message. + True if the binding supports the current request. + + + + Get a cached binding instance that supports the requested type. + + Type of binding to get + A derived class instance that supports the requested binding. + + + + Get a cached binding instance that can handle the current request. + + Current HttpRequest + A derived class instance that supports the requested binding, + or null if no binding supports the current request. + + + + Gets the Saml2BindingType enum value for a Saml2Binding type uri, where the + uri should be one specified in the standard. + + Uri for the binding. + Binding type enum value. + If the uri doesn't correspond to a known binding. + + + + Gets the Uri for a Saml2BindingType. + + Saml2BindingType + Uri constant for the speicified Binding Type + If the type is not mapped. + + + + Saml2 binding types. + + + + + The http redirect binding according to saml bindings section 3.4 + + + + + The http post binding according to saml bindings section 3.5 + + + + + The artifact resolution binding according to bindings section 3.6 + + + + + The urls of Saml2 that are used in various messages. + + + + + Resolve the urls for Saml2 from an http request and options. + + Request to get application root url from. + Options to get module path and (optional) notification hooks from. + + + + Creates the urls for Saml2 based on the complete base Url + the application and the Saml2 base module path. + + The full Url to the root of the application. + Path of module, starting with / and ending without. + + + + Creates the urls for Saml2 based on the given full urls + for assertion consumer service and sign-in + + The full Url for the Assertion Consumer Service. + The full Url for sign-in. + The full Url for the application root. + + + + The full url of the assertion consumer service. + + + + + The full url of the signin command, which is also the response + location for idp discovery. + + + + + The full url of the application root. Used as default redirect + location after logout. + + + + + The full url of the logout command. + + + + + Represents the sign in command behaviour. + Instances of this class can be created directly or by using the factory method + CommandFactory.GetCommand(CommandFactory.SignInCommandName). + + + + + Run the command, initiating the sign in sequence. + + Request data. + Options + CommandResult + + + + Initiate the sign in sequence. + + Entity id of idp to sign in to, or + null to use default (discovery service if configured) + Path to redirect to when the sign in + is complete. + The incoming http request. + Options. + Data to store and make available when the + ACS command has processed the response. + Command Result + + + + Extension methods and helpers for XmlDocument/XmlElement etc. + + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + + + + Creates an Xml document with secure settings and initialized it from + a string. + + Source string to load + Xml document + + + + Create an Xml Document with secure settings, specifically + disabling xml external entities. Also set PreserveWhiteSpace = true + + Xml Document + + + + Remove the attribute with the given name from the collection. + + Attribute collection. + Name of attribute to remove. + + + + Remove the child xml element with the specified name. + + Parent + Name of child + Namespace of child + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml document with the supplied cert. + + XmlDocument to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + Uri of signing algorithm to use. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + + + + Sign an xml element with the supplied cert. + + xmlElement to be signed. The signature is + added as a node in the document, right after the Issuer node. + Certificate to use when signing. + Include public key in signed output. + The signing algorithm to use. + + + + Checks if an xml element is signed by the given certificate, through + a contained enveloped signature. + + Xml Element that should be signed + Signing keys to test, one should validate. + Should the certificate be validated too? + The mininum signing algorithm + strength allowed. + True on correct signature, false on missing signature + If the data has + been tampered with or is not valid according to the SAML spec. + + + + Workaround for a bug in Reference.LoadXml incorrectly counting index + of signature from the start of the document, not from the start of + the element. Reported to Microsoft at + https://connect.microsoft.com/VisualStudio/feedback/details/2288620 + + SignedXml + Signature element. + + + + Check if the signature method is at least as strong as the mininum one. + + + + If the signaturemethod is too weak. + + + + Pretty an xml element. + + Xml to pretty print. + Nicely indented and readable data. + + + + Store a list of signing algorithms that are available in SignedXml. + This needs to be done through reflection, to keep the library + targetting lowest supported .NET version, while still getting + access to new algorithms if the hosting application targets a + later version. + + + + diff --git a/packages/Sustainsys.Saml2.2.11.0/sustainsys.png b/packages/Sustainsys.Saml2.2.11.0/sustainsys.png new file mode 100644 index 0000000..960577f Binary files /dev/null and b/packages/Sustainsys.Saml2.2.11.0/sustainsys.png differ diff --git a/packages/Sustainsys.Saml2.HttpModule.2.11.0/.signature.p7s b/packages/Sustainsys.Saml2.HttpModule.2.11.0/.signature.p7s new file mode 100644 index 0000000..8b4950a Binary files /dev/null and b/packages/Sustainsys.Saml2.HttpModule.2.11.0/.signature.p7s differ diff --git a/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.Saml2.HttpModule.2.11.0.nupkg b/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.Saml2.HttpModule.2.11.0.nupkg new file mode 100644 index 0000000..c9313d3 Binary files /dev/null and b/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.Saml2.HttpModule.2.11.0.nupkg differ diff --git a/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.png b/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.png new file mode 100644 index 0000000..960577f Binary files /dev/null and b/packages/Sustainsys.Saml2.HttpModule.2.11.0/Sustainsys.png differ diff --git a/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.XML b/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.XML new file mode 100644 index 0000000..3f5b880 --- /dev/null +++ b/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.XML @@ -0,0 +1,106 @@ + + + + Sustainsys.Saml2.HttpModule + + + + + Extension methods to CommandResult to update a HttpResponseBase. + + + + + Apply the command result to a bare HttpResponse. + + The CommandResult that will update the HttpResponse. + Http Response to write the result to. + Include a SameSite=None attribute on any cookies set + Path of Sustainsys.Saml2 instance - used for isolation of data protection + + + + Apply cookies of the CommandResult to the response. + + Commandresult + Response + Include a SameSite=None attribute on any cookies set + Path of Sustainsys.Saml2 instance - used for isolation of data protection + + + + Apply headers of the command result to the response. + + Command result containing headers. + Response to set headers in. + + + + Establishes an application session by calling the session authentication module. + + + + + Static class that hold extension methods for . + + + + + Purpose string used with data protection. + + + + + Extension method to convert a HttpRequestBase to a HttpRequestData. + + The request object used to populate the HttpRequestData. + Path of Sustainsys.Saml2 instance - used for isolation of data protection + The HttpRequestData object that has been populated by the request. + + + + Extension method to convert a HttpRequestBase to a HttpRequestData. + + The request object used to populate the HttpRequestData. + Ignore cookies when extracting data. + This is useful for the stub idp that might see the relay state + and the requester's cookie, but shouldn't try to decrypt it. + Path of Sustainsys.Saml2 instance - used for isolation of data protection + The HttpRequestData object that has been populated by the request. + + + + Http Module for SAML2 authentication. The module hijacks the + ~/Saml2AuthenticationModule/ path of the http application to provide + authentication services. + + + + + The one and only options instance used by the + . It is instantiated by + loading the web.config, but after that it can be modified or even + replaced from code. + + + + + Init the module and subscribe to events. + + + + + + Begin request handler that captures all traffic to configured module + path. + + The http application. + Ignored + + + + IDisposable implementation. + + + + diff --git a/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.dll b/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.dll new file mode 100644 index 0000000..1f925cc Binary files /dev/null and b/packages/Sustainsys.Saml2.HttpModule.2.11.0/lib/net472/Sustainsys.Saml2.HttpModule.dll differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/.signature.p7s b/packages/System.Configuration.ConfigurationManager.4.4.1/.signature.p7s new file mode 100644 index 0000000..ed940fa Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/.signature.p7s differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/LICENSE.TXT b/packages/System.Configuration.ConfigurationManager.4.4.1/LICENSE.TXT new file mode 100644 index 0000000..984713a --- /dev/null +++ b/packages/System.Configuration.ConfigurationManager.4.4.1/LICENSE.TXT @@ -0,0 +1,23 @@ +The MIT License (MIT) + +Copyright (c) .NET Foundation and Contributors + +All rights reserved. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/System.Configuration.ConfigurationManager.4.4.1.nupkg b/packages/System.Configuration.ConfigurationManager.4.4.1/System.Configuration.ConfigurationManager.4.4.1.nupkg new file mode 100644 index 0000000..3901149 Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/System.Configuration.ConfigurationManager.4.4.1.nupkg differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/THIRD-PARTY-NOTICES.TXT b/packages/System.Configuration.ConfigurationManager.4.4.1/THIRD-PARTY-NOTICES.TXT new file mode 100644 index 0000000..06055ff --- /dev/null +++ b/packages/System.Configuration.ConfigurationManager.4.4.1/THIRD-PARTY-NOTICES.TXT @@ -0,0 +1,226 @@ +.NET Core uses third-party libraries or other resources that may be +distributed under licenses different than the .NET Core software. + +In the event that we accidentally failed to list a required notice, please +bring it to our attention. Post an issue or email us: + + dotnet@microsoft.com + +The attached notices are provided for information only. + +License notice for Slicing-by-8 +------------------------------- + +http://sourceforge.net/projects/slicing-by-8/ + +Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + + +This software program is licensed subject to the BSD License, available at +http://www.opensource.org/licenses/bsd-license.html. + + +License notice for Unicode data +------------------------------- + +http://www.unicode.org/copyright.html#License + +Copyright © 1991-2017 Unicode, Inc. All rights reserved. +Distributed under the Terms of Use in http://www.unicode.org/copyright.html. + +Permission is hereby granted, free of charge, to any person obtaining +a copy of the Unicode data files and any associated documentation +(the "Data Files") or Unicode software and any associated documentation +(the "Software") to deal in the Data Files or Software +without restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, and/or sell copies of +the Data Files or Software, and to permit persons to whom the Data Files +or Software are furnished to do so, provided that either +(a) this copyright and permission notice appear with all copies +of the Data Files or Software, or +(b) this copyright and permission notice appear in associated +Documentation. + +THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF +ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT OF THIRD PARTY RIGHTS. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS +NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL +DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, +DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER +TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THE DATA FILES OR SOFTWARE. + +Except as contained in this notice, the name of a copyright holder +shall not be used in advertising or otherwise to promote the sale, +use or other dealings in these Data Files or Software without prior +written authorization of the copyright holder. + +License notice for Zlib +----------------------- + +https://github.com/madler/zlib +http://zlib.net/zlib_license.html + +/* zlib.h -- interface of the 'zlib' general purpose compression library + version 1.2.11, January 15th, 2017 + + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler + + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + +*/ + +License notice for Mono +------------------------------- + +http://www.mono-project.com/docs/about-mono/ + +Copyright (c) .NET Foundation Contributors + +MIT License + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the Software), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for International Organization for Standardization +----------------------------------------------------------------- + +Portions (C) International Organization for Standardization 1986: + Permission to copy in any form is granted for use with + conforming SGML systems and applications as defined in + ISO 8879, provided this notice is included in all copies. + +License notice for Intel +------------------------ + +"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this +list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, +this list of conditions and the following disclaimer in the documentation +and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License notice for Xamarin and Novell +------------------------------------- + +Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Copyright (c) 2011 Novell, Inc (http://www.novell.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Third party notice for W3C +-------------------------- + +"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE +Status: This license takes effect 13 May, 2015. +This work is being provided by the copyright holders under the following license. +License +By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. +Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: +The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. +Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. +Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." +Disclaimers +THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. +COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. +The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." + +License notice for Bit Twiddling Hacks +-------------------------------------- + +Bit Twiddling Hacks + +By Sean Eron Anderson +seander@cs.stanford.edu + +Individually, the code snippets here are in the public domain (unless otherwise +noted) — feel free to use them however you please. The aggregate collection and +descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are +distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and +without even the implied warranty of merchantability or fitness for a particular +purpose. diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/lib/net461/System.Configuration.ConfigurationManager.dll b/packages/System.Configuration.ConfigurationManager.4.4.1/lib/net461/System.Configuration.ConfigurationManager.dll new file mode 100644 index 0000000..58530a4 Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/lib/net461/System.Configuration.ConfigurationManager.dll differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/lib/netstandard2.0/System.Configuration.ConfigurationManager.dll b/packages/System.Configuration.ConfigurationManager.4.4.1/lib/netstandard2.0/System.Configuration.ConfigurationManager.dll new file mode 100644 index 0000000..8f9fd3c Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/lib/netstandard2.0/System.Configuration.ConfigurationManager.dll differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.dll b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.dll new file mode 100644 index 0000000..11faff7 Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.dll differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.xml b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.xml new file mode 100644 index 0000000..fdf8ae3 --- /dev/null +++ b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/net461/System.Configuration.ConfigurationManager.xml @@ -0,0 +1,4888 @@ + + + + System.Configuration.ConfigurationManager + + + + Provides a object that uses the Windows data protection API (DPAPI) to encrypt and decrypt configuration data. + + + Initializes a new instance of the class using default settings. + + + Decrypts the passed object. + + A decrypted object. + encrypted_node does not have set to "EncryptedData" and set to . - or - encrypted_node does not have a child node named "CipherData" with a child node named "CipherValue". - or - The child node named "CipherData" is an empty node. + + + Encrypts the passed object. + The object to encrypt. + An encrypted object. + + + Initializes the provider with default settings. + The provider name to use for the object. + A collection of values to use when initializing the object. + configurationValues contains an unrecognized configuration setting. + + + Gets a value that indicates whether the object is using machine-specific or user-account-specific protection. + true if the is using machine-specific protection; false if it is using user-account-specific protection. + + + Contains meta-information about an individual element within the configuration. This class cannot be inherited. + + + Gets the errors for the associated element and subelements + The collection containing the errors for the associated element and subelements + + + Gets a value indicating whether the associated object is a collection. + true if the associated object is a collection; otherwise, false. + + + Gets a value that indicates whether the associated object cannot be modified. + true if the associated object cannot be modified; otherwise, false. + + + Gets a value indicating whether the associated object is in the configuration file. + true if the associated object is in the configuration file; otherwise, false. + + + Gets the line number in the configuration file where the associated object is defined. + The line number in the configuration file where the associated object is defined. + + + Gets a collection of the properties in the associated object. + A collection of the properties in the associated object. + + + Gets the source file where the associated object originated. + The source file where the associated object originated. + + + Gets the type of the associated object. + The type of the associated object. + + + Gets the object used to validate the associated object. + The object used to validate the associated object. + + + Defines the configuration file mapping for an .exe application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified machine configuration file name. + The name of the machine configuration file that includes the complete physical path (for example, c:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\machine.config). + + + Creates a copy of the existing object. + An object. + + + Gets or sets the name of the configuration file. + The configuration file name. + + + Gets or sets the name of the configuration file for the local user. + The configuration file name. + + + Gets or sets the name of the configuration file for the roaming user. + The configuration file name. + + + Manages the path context for the current application. This class cannot be inherited. + + + Gets the current path for the application. + A string value containing the current path. + + + Gets an object representing the path level of the current application. + A object representing the path level of the current application. + + + Converts between a string and an enumeration type. + + + Initializes a new instance of the class. + The enumeration type to convert. + typeEnum is null. + + + Converts a to an type. + The object used for type conversions. + The object used during conversion. + The object to convert. + The type that represents the data parameter. + data is null or an empty string (""). - or - data starts with a numeric character. - or - data includes white space. + + + Converts an type to a value. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter. + + + Defines extended capabilities for client-based application settings providers. + + + Returns the value of the specified settings property for the previous version of the same application. + A describing the current application usage. + The whose value is to be returned. + A containing the value of the specified property setting as it was last set in the previous version of the application; or null if the setting cannot be found. + + + Resets the application settings associated with the specified application to their default values. + A describing the current application usage. + + + Indicates to the provider that the application has been upgraded. This offers the provider an opportunity to upgrade its stored settings as appropriate. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + + + Handles the access to certain configuration sections. + + + Creates a configuration section handler. + Parent object. + Configuration context object. + Section XML node. + The created section handler object. + + + Provides standard configuration methods. + + + Gets the specified configuration. + The configuration key. + The object representing the configuration. + + + Used for initialization. + + + Provides the configuration setting for International Domain Name (IDN) processing in the class. + + + Initializes a new instance of the class. + + + Gets or sets the value of the configuration setting. + A that contains the current configuration setting for IDN processing. + + + Provides a wrapper type definition for configuration sections that are not handled by the types. + + + Initializes a new instance of the class. + + + Provides a legacy section-handler definition for configuration sections that are not handled by the types. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds the specified configuration object to the section-handler collection. + The configuration settings in a corresponding parent configuration section. + The virtual path for which the configuration section handler computes configuration values. Normally this parameter is reserved and is null. + An that contains the configuration information to be handled. Provides direct access to the XML contents of the configuration section. + The created configuration handler object. + + + Converts between a string and the standard infinite or integer value. + + + Initializes a new instance of the class. + + + Converts a to an . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter integer value. + + + Converts an .to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The "infinite" if the value is ; otherwise, the representing the value parameter. + + + Converts between a string and the standard infinite value. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the infinite; otherwise, the representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The used during object conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in minutes. + + + Provides validation of an value. + + + Initializes a new instance of the class. + An object that specifies the minimum value. + An object that specifies the maximum value. + + + Initializes a new instance of the class. + An object that specifies the minimum value. + An object that specifies the maximum value. + true to specify that the validation range is exclusive. Inclusive means the value to be validated must be within the specified range; exclusive means that it must be below the minimum or above the maximum. + + + Initializes a new instance of the class. + An object that specifies the minimum length of the integer value. + An object that specifies the maximum length of the integer value. + A value that specifies whether the validation range is exclusive. + An object that specifies a value that must be matched. + resolution is less than 0. - or - minValue is greater than maxValue. + + + Determines whether the type of the object can be validated. + The type of the object. + true if the type parameter matches an value; otherwise, false. + + + Determines whether the value of an object is valid. + The value to be validated. + + + Declaratively instructs the .NET Framework to perform integer validation on a configuration property. This class cannot be inherited. + + + Creates a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range defined by the and property values. + true if the value must be excluded; otherwise, false. The default is false. + + + Gets or sets the maximum value allowed for the property. + An integer that indicates the allowed maximum value. + The selected value is less than . + + + Gets or sets the minimum value allowed for the property. + An integer that indicates the allowed minimum value. + The selected value is greater than . + + + Gets an instance of the class. + The validator instance. + + + Delegates all members of the interface to another instance of a host. + + + Initializes a new instance of the class. + + + Creates a new configuration context. + A string representing the path to a configuration file. + A string representing a location subpath. + A representing a new configuration context. + + + Creates a deprecated configuration context. + A string representing the path to a configuration file. + A representing a deprecated configuration context. + + + Decrypts an encrypted configuration section. + An encrypted section of a configuration file. + A object. + + A string representing a decrypted configuration section. + + + Deletes the object performing I/O tasks on a configuration file. + The name of a object performing I/O tasks on a configuration file. + + + Encrypts a section of a configuration object. + + A object. + + A string representing an encrypted section of the configuration object. + + + Returns a configuration path based on a location subpath. + A string representing the path to a configuration file. + + A string representing a configuration path. + + + Returns a representing the type of the configuration. + A string representing the configuration type. + true if an exception should be thrown if an error is encountered; false if an exception should not be thrown if an error is encountered. + A representing the type of the configuration. + + + Returns a string representing the type name of the configuration object. + A object. + A string representing the type name of the configuration object. + + + Returns the name of a object performing I/O tasks on a configuration file. + A string representing the path to a configuration file. + A string representing the name of a object performing I/O tasks on a configuration file. + + + Returns the name of a object performing I/O tasks on a configuration source. + The name of a object performing I/O tasks on a configuration file. + A string representing the configuration source. + A string representing the name of a object performing I/O tasks on a configuration source. + + + Returns a object representing the version of a object performing I/O tasks on a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object representing the version of a object performing I/O tasks on a configuration file. + + + Gets or sets the object. + A object. + + + Instructs the host to impersonate and returns an object required internally by the .NET Framework. + An value. + + + Initializes the configuration host. + + A parameter object containing the values used for initializing the configuration host. + + + Initializes the host for configuration. + A string representing a location subpath (passed by reference). + A string representing the path to a configuration file. + The location configuration path. + + A parameter object representing the parameters used to initialize the host. + + + Returns a value indicating whether the configuration is above the application configuration in the configuration hierarchy. + A string representing the path to a configuration file. + true if the configuration is above the application configuration in the configuration hierarchy; otherwise, false. + + + Returns a value indicating whether a configuration record is required for the host configuration initialization. + A string representing the path to a configuration file. + true if a configuration record is required for the host configuration initialization; otherwise, false. + + + Restricts or allows definitions in the host configuration. + A string representing the path to a configuration file. + The object. + The object. + true if the grant or restriction of definitions in the host configuration was successful; otherwise, false. + + + Returns a value indicating whether the file path used by a object to read a configuration file is a valid path. + The name of a object performing I/O tasks on a configuration file. + true if the path used by a object to read a configuration file is a valid path; otherwise, false. + + + Returns a value indicating whether a configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands. + The object. + true if the configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands; otherwise, false. + + + Returns a value indicating whether the initialization of a configuration object is considered delayed. + The object. + true if the initialization of a configuration object is considered delayed; otherwise, false. + + + Returns a value indicating whether the configuration object supports a location tag. + A string representing the path to a configuration file. + true if the configuration object supports a location tag; otherwise, false. + + + Gets a value indicating whether the configuration is remote. + true if the configuration is remote; otherwise, false. + + + Returns a value indicating whether a configuration path is to a configuration node whose contents should be treated as a root. + A string representing the path to a configuration file. + true if the configuration path is to a configuration node whose contents should be treated as a root; otherwise, false. + + + Returns a value indicating whether the configuration path is trusted. + A string representing the path to a configuration file. + true if the configuration path is trusted; otherwise, false. + + + Opens a object to read a configuration file. + The name of a object performing I/O tasks on a configuration file. + Returns the object specified by streamName. + + + Opens a object to read a configuration file. + The name of a object performing I/O tasks on a configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Opens a object for writing to a configuration file or for writing to a temporary file used to build a configuration file. Allows a object to be designated as a template for copying file attributes. + The name of a object performing I/O tasks on a configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object (passed by reference). + A object. + + + Opens a object for writing to a configuration file. Allows a object to be designated as a template for copying file attributes. + The name of a object performing I/O tasks on a configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object performing I/O tasks on the configuration file (passed by reference). + true to assert permissions; otherwise, false. + Returns the object specified by the streamName parameter. + + + Returns a value indicating whether the entire configuration file could be read by a designated object. + A string representing the path to a configuration file. + The name of a object performing I/O tasks on a configuration file. + true if the entire configuration file could be read by the object designated by streamName; otherwise, false. + + + Instructs the object to read a designated section of its associated configuration file. + A string representing the name of a section group in the configuration file. + A string representing the name of a section in the configuration file. + true if a section of the configuration file designated by the sectionGroupName and sectionName parameters can be read by a object; otherwise, false. + + + Indicates that a new configuration record requires a complete initialization. + An object. + + + Instructs the host to monitor an associated object for changes in a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object to receive the returned data representing the changes in the configuration file. + An instance containing changed configuration settings. + + + Instructs the host object to stop monitoring an associated object for changes in a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object. + + + Gets a value indicating whether the host configuration supports change notifications. + true if the host supports change notifications; otherwise, false. + + + Gets a value indicating whether the host configuration supports location tags. + true if the host supports location tags; otherwise, false. + + + Gets a value indicating whether the host configuration has path support. + true if the host configuration has path support; otherwise, false. + + + Gets a value indicating whether the host configuration supports refresh. + true if the host configuration supports refresh; otherwise, false. + + + Verifies that a configuration definition is allowed for a configuration record. + A string representing the path to a configuration file. + An object. + A object + An object. + + + Indicates that all writing to the configuration file has completed. + The name of a object performing I/O tasks on a configuration file. + true if writing to the configuration file completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + + + Indicates that all writing to the configuration file has completed and specifies whether permissions should be asserted. + The name of a object performing I/O tasks on a configuration file. + true to indicate that writing was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + + + Defines an interface used by the .NET Framework to support creating error configuration records. + + + Gets a string specifying the file name related to the configuration details. + A string specifying a filename. + + + Gets an integer specifying the line number related to the configuration details. + An integer specifying a line number. + + + Defines an interface used by the .NET Framework to support the initialization of configuration properties. + + + Gets the configuration host. + An object that is used by the .NET Framework to initialize application configuration properties. + + + Initializes a configuration object. + The type of configuration host. + An array of configuration host parameters. + + + Gets the root of the configuration hierarchy. + An object. + + + Defines an interface used by the .NET Framework to support configuration management. + + + Ensures that the networking configuration is loaded. + + + Provides the possible values for the configuration setting of the in the namespace. + + + This value will convert any Unicode domain names to their Punycode equivalents (IDN names). + + + + This value will convert all external Unicode domain names to use the Punycode equivalents (IDN names). In this case to handle international names on the local Intranet, the DNS servers that are used for the Intranet should support Unicode names. + + + + This value will not convert any Unicode domain names to use Punycode. This is the default value which is consistent with the .NET Framework 2.0 behavior. + + + + Is the base class to create providers for encrypting and decrypting protected-configuration data. + + + Initializes a new instance of the class using default settings. + + + Decrypts the passed object from a configuration file. + + The object containing decrypted data. + + + Encrypts the passed object from a configuration file. + The object to encrypt. + The object containing encrypted data. + + + Provides a collection of objects. + + + Initializes a new instance of the class using default settings. + + + Adds a object to the collection. + A object to add to the collection. + provider is null. + provider is not a object. + The object to add already exists in the collection. - or - The collection is read-only. + + + Gets a object in the collection with the specified name. + The name of a object in the collection. + The object with the specified name, or null if there is no object with that name. + + + Provides programmatic access to the configProtectedData configuration section. This class cannot be inherited. + + + Initializes a new instance of the class using default settings. + + + Gets or sets the name of the default object in the collection property. + The name of the default object in the collection property. + + + Gets a collection of all the objects in all participating configuration files. + A collection of all the objects in all participating configuration files. + + + Represents a group of configuration elements that configure the providers for the <configProtectedData> configuration section. + + + Initializes a new instance of the class. + + + Gets a collection that represents the properties of the providers for the protected configuration data. + A that represents the properties of the providers for the protected configuration data. + + + Gets a collection of objects that represent the properties of the providers for the protected configuration data. + A collection of objects that represent the properties of the providers for the protected configuration data. + + + Provides a base implementation for the extensible provider model. + + + Initializes a new instance of the class. + + + Gets a brief, friendly description suitable for display in administrative tools or other user interfaces (UIs). + A brief, friendly description suitable for display in administrative tools or other UIs. + + + Initializes the configuration builder. + The friendly name of the provider. + A collection of the name/value pairs representing the provider-specific attributes specified in the configuration for this provider. + The name of the provider is null. + The name of the provider has a length of zero. + An attempt is made to call on a provider after the provider has already been initialized. + + + Gets the friendly name used to refer to the provider during configuration. + The friendly name used to refer to the provider during configuration. + + + Represents a collection of provider objects that inherit from . + + + Initializes a new instance of the class. + + + Adds a provider to the collection. + The provider to be added. + The collection is read-only. + provider is null. + The of provider is null. - or - The length of the of provider is less than 1. + + + Removes all items from the collection. + The collection is set to read-only. + + + Copies the contents of the collection to the given array starting at the specified index. + The array to copy the elements of the collection to. + The index of the collection item at which to start the copying process. + + + Gets the number of providers in the collection. + The number of providers in the collection. + + + Returns an object that implements the interface to iterate through the collection. + An object that implements to iterate through the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + false in all cases. + + + Gets the provider with the specified name. + The key by which the provider is identified. + The provider with the specified name. + + + Removes a provider from the collection. + The name of the provider to be removed. + The collection has been set to read-only. + + + Sets the collection to be read-only. + + + Gets the current object. + The current object. + + + Copies the elements of the to an array, starting at a particular array index. + The array to copy the elements of the collection to. + The index of the array at which to start copying provider instances from the collection. + + + The exception that is thrown when a configuration provider error has occurred. This exception class is also used by providers to throw exceptions when internal errors occur within the provider that do not map to other pre-existing exception classes. + + + Creates a new instance of the class. + + + Creates a new instance of the class. + A message describing why this was thrown. + + + Creates a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + + + Creates a new instance of the class. + A message describing why this was thrown. + The exception that caused this to be thrown. + + + Represents the configuration elements associated with a provider. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + The name of the provider to configure settings for. + The type of the provider to configure settings for. + + + Gets or sets the name of the provider configured by this class. + The name of the provider. + + + Gets a collection of user-defined parameters for the provider. + A of parameters for the provider. + + + Gets or sets the type of the provider configured by this class. + The fully qualified namespace and class name for the type of provider configured by this instance. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + The object to add. + + + Clears the collection. + + + Gets or sets a value at the specified index in the collection. + + The specified . + + + Gets an item from the collection. + A string reference to the object within the collection. + A object contained in the collection. + + + Removes an element from the collection. + + + + Provides validation of a string based on the rules provided by a regular expression. + + + Initializes a new instance of the class. + A string that specifies a regular expression. + regex is null or an empty string (""). + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches a string; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + value does not conform to the parameters of the class. + + + Declaratively instructs the .NET Framework to perform string validation on a configuration property using a regular expression. This class cannot be inherited. + + + Initializes a new instance of the object. + The string to use for regular expression validation. + + + Gets the string used to perform regular-expression validation. + The string containing the regular expression used to filter the string assigned to the decorated configuration-element property. + + + Gets an instance of the class. + The validator instance. + + + Provides a instance that uses RSA encryption to encrypt and decrypt configuration data. + + + Initializes a new instance of the class. + + + Adds a key to the RSA key container. + The size of the key to add. + true to indicate that the key is exportable; otherwise, false. + + + Gets the name of the Windows cryptography API (crypto API) cryptographic service provider (CSP). + The name of the CryptoAPI cryptographic service provider. + + + Decrypts the XML node passed to it. + + The decrypted XML node. + + + Removes a key from the RSA key container. + + + Encrypts the XML node passed to it. + The to encrypt. + An encrypted object. + + + Exports an RSA key from the key container. + The file name and path to export the key to. + true to indicate that private parameters are exported; otherwise, false. + path is a zero-length string, contains only white space, or contains one or more invalid characters as defined by . + path is null. + The specified path, file name, or both exceed the system-defined maximum length. For example, on Windows-based platforms, paths must be less than 248 characters, and file names must be less than 260 characters. + The specified path is invalid, such as being on an unmapped drive. + An error occurred while opening the file. + path specified a file that is read-only. -or- This operation is not supported on the current platform. -or- path specified a directory. -or- The caller does not have the required permission. + The file specified in path was not found. + path is in an invalid format. + The caller does not have the required permission. + + + Imports an RSA key into the key container. + The file name and path to import the key from. + true to indicate that the key is exportable; otherwise, false. + path is a zero-length string, contains only white space, or contains one or more invalid characters as defined by . + path is null. + The specified path, file name, or both exceed the system-defined maximum length. For example, on Windows-based platforms, paths must be less than 248 characters, and file names must be less than 260 characters. + The specified path is invalid, such as being on an unmapped drive. + An error occurred while opening the file. + path specified a file that is write-only. -or- This operation is not supported on the current platform. -or- path specified a directory. -or- The caller does not have the required permission. + The file specified in path was not found. + path is in an invalid format. + + + Initializes the provider with default settings. + The provider name to use for the object. + A collection of values to use when initializing the object. + configurationValues includes one or more unrecognized values. + + + Gets the name of the key container. + The name of the key container. + + + Gets the public key used by the provider. + An object that contains the public key used by the provider. + + + Gets a value indicating whether the provider uses FIPS. + true if the provider uses FIPS; otherwise, false. + + + Gets a value that indicates whether the object is using the machine key container. + true if the object is using the machine key container; otherwise, false. + + + Gets a value that indicates whether the provider is using Optimal Asymmetric Encryption Padding (OAEP) key exchange data. + true if the object is using Optimal Asymmetric Encryption Padding (OAEP) key exchange data; otherwise, false. + + + Represents an element in a class. + + + Initializes a new instance of the class. + + + Gets the value of the GenericUriParserOptions entry from a instance. + The value of GenericUriParserOptions entry. + + + Gets the value of the Name entry from a instance. + The protocol used by this schema setting. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Gets the default collection type of . + The default collection type of . + + + The index of the specified . + The for the specified index location. + The index of the specified ; otherwise, -1. + + + Gets an item at the specified index in the collection. + The index of the to return. + The specified . + The index parameter is less than zero. -or- The item specified by the parameter is null or has been removed. + + + Gets an item from the collection. + A string reference to the object within the collection. + A object contained in the collection. + + + Contains metadata about an individual section within the configuration hierarchy. This class cannot be inherited. + + + Gets or sets a value that indicates where in the configuration file hierarchy the associated configuration section can be defined. + A value that indicates where in the configuration file hierarchy the associated object can be declared. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates where in the configuration file hierarchy the associated configuration section can be declared. + A value that indicates where in the configuration file hierarchy the associated object can be declared for .exe files. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates whether the configuration section allows the location attribute. + true if the location attribute is allowed; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates whether the associated configuration section can be overridden by lower-level configuration files. + true if the section can be overridden; otherwise, false. The default is false. + + + Gets or sets the name of the include file in which the associated configuration section is defined, if such a file exists. + The name of the include file in which the associated is defined, if such a file exists; otherwise, an empty string (""). + + + Forces the associated configuration section to appear in the configuration file. + + + Forces the associated configuration section to appear in the configuration file, or removes an existing section from the configuration file. + + require is true and the associated section cannot be exported to the child configuration file, or it is undeclared. + + + Gets or sets a value that indicates whether the associated configuration section will be saved even if it has not been modified. +

true if the associated object will be saved even if it has not been modified; otherwise, false. The default is false.

+


If the configuration file is saved (even if there are no modifications), ASP.NET restarts the application.

+

+
+
+ + Gets the configuration section that contains the configuration section associated with this object. + The configuration section that contains the that is associated with this object. + The method is invoked from a parent section. + + + Returns an XML node object that represents the associated configuration-section object. + The XML representation for this configuration section. + This configuration object is locked and cannot be edited. + + + Gets or sets a value that indicates whether the settings that are specified in the associated configuration section are inherited by applications that reside in a subdirectory of the relevant application. + true if the settings specified in this object are inherited by child applications; otherwise, false. The default is true. + + + Gets a value that indicates whether the configuration section must be declared in the configuration file. + true if the associated object must be declared in the configuration file; otherwise, false. + + + Gets a value that indicates whether the associated configuration section is declared in the configuration file. + true if this is declared in the configuration file; otherwise, false. The default is true. + + + Gets a value that indicates whether the associated configuration section is locked. + true if the section is locked; otherwise, false. + + + Gets a value that indicates whether the associated configuration section is protected. + true if this is protected; otherwise, false. The default is false. + + + Gets the name of the associated configuration section. + The complete name of the configuration section. + + + Gets or sets the enumeration value that specifies whether the associated configuration section can be overridden by child configuration files. + One of the enumeration values. + An attempt was made to change both the and properties, which is not supported for compatibility reasons. + + + Gets or sets a value that specifies the default override behavior of a configuration section by child configuration files. + One of the enumeration values. + The override behavior is specified in a parent configuration section. + + + Gets the override behavior of a configuration section that is in turn based on whether child configuration files can lock the configuration section. + One of the enumeration values. + + + Gets the protected configuration provider for the associated configuration section. + The protected configuration provider for this object. + + + Marks a configuration section for protection. + + The property is set to false. - or - The target section is already a protected data section. + + + Gets a value that indicates whether the associated configuration section requires access permissions. + true if the requirePermission attribute is set to true; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that specifies whether a change in an external configuration include file requires an application restart. + true if a change in an external configuration include file requires an application restart; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Causes the associated configuration section to inherit all its values from the parent section. + This method cannot be called outside editing mode. + + + Gets the name of the associated configuration section. + The name of the associated object. + + + Sets the object to an XML representation of the associated configuration section within the configuration file. + + xml is null. + + + Gets or sets the section class name. + The name of the class that is associated with this section. + The selected value is null or an empty string (""). + The selected value conflicts with a value that is already defined. + + + Removes the protected configuration encryption from the associated configuration section. + + + Represents a custom settings attribute used to associate settings information with a settings property. + + + Initializes a new instance of the class. + + + Provides data for the event. + + + Initializes an instance of the class. + A containing the name of the application setting. + A containing a category description of the setting. Often this parameter is set to the application settings group name. + A containing the application settings key. + An that contains the new value to be assigned to the application settings property. + true to cancel the event; otherwise, false. + + + Gets the new value being assigned to the application settings property. + An that contains the new value to be assigned to the application settings property. + + + Gets the application settings property category. + A containing a category description of the setting. Typically, this parameter is set to the application settings group name. + + + Gets the application settings key associated with the property. + A containing the application settings key. + + + Gets the name of the application setting associated with the application settings property. + A containing the name of the application setting. + + + Represents the method that will handle the event. + The source of the event, typically an application settings wrapper class derived from the class. + A containing the data for the event. + + + Represents a simplified configuration element used for updating elements in the configuration. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on supplied parameters. + The name of the object. + A object. This object is an enumeration used as the serialization scheme to store configuration settings. + + + Compares the current instance to the specified object. + + true if the instance is equal to the specified object; otherwise, false. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Gets or sets the name of the object. + The name of the object. + + + Gets or sets the serialization mechanism used to persist the values of the object. + A object. + + + Gets or sets the value of a object by using a object. + A object containing the value of the object. + + + Contains a collection of objects. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + The object to add to the collection. + + + Removes all objects from the collection. + + + Gets the type of the configuration collection. + The object of the collection. + + + Gets a object from the collection. + A string value representing the object in the collection. + A object. + + + Removes a object from the collection. + A object. + + + Represents a collection of key/value pairs used to describe a configuration object as well as a object. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A collection of key/value pairs that are related to configuration settings. + + + Provides the base class used to support user property settings. + + + Initializes a new instance of the class. + + + Gets the associated settings context. + A associated with the settings instance. + + + Initializes internal properties used by object. + The settings context related to the settings properties. + The settings properties that will be accessible from the instance. + The initialized providers that should be used when loading and saving property values. + + + Gets a value indicating whether access to the object is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets or sets the value of the specified settings property. + A containing the name of the property to access. + If found, the value of the named settings property. + There are no properties associated with the current object, or the specified property could not be found. + An attempt was made to set a read-only property. + The value supplied is of a type incompatible with the settings property, during a set operation. + + + Gets the collection of settings properties. + A collection containing all the objects. + + + Gets a collection of settings property values. + A collection of objects representing the actual data values for the properties managed by the instance. + + + Gets a collection of settings providers. + A containing objects. + + + Stores the current values of the settings properties. + + + Provides a class that is synchronized (thread safe). + The class used to support user property settings. + A class that is synchronized. + + + Provides contextual information that the provider can use when persisting settings. + + + Initializes a new instance of the class. + + + Provides a string that describes an individual configuration property. This class cannot be inherited. + + + Initializes an instance of the class. + The used as descriptive text. + + + Gets the descriptive text for the associated configuration property. + A containing the descriptive text for the associated configuration property. + + + Provides a string that describes an application settings property group. This class cannot be inherited. + + + Initializes a new instance of the class. + A containing the descriptive text for the application settings group. + + + The descriptive text for the application settings properties group. + A containing the descriptive text for the application settings group. + + + Specifies a name for application settings property group. This class cannot be inherited. + + + Initializes a new instance of the class. + A containing the name of the application settings property group. + + + Gets the name of the application settings property group. + A containing the name of the application settings property group. + + + Provides data for the event. + + + Initializes a new instance of the class. + A object from which settings are loaded. + + + Gets the settings provider used to store configuration settings. + A settings provider. + + + Represents the method that will handle the event. + The source of the event, typically the settings class. + A object that contains the event data. + + + Provides values to indicate which services should be made available to application settings. + + + Enables application settings to be stored in roaming user profiles. For more information about roaming user profiles, see Isolated Storage and Roaming. + + + + Specifies special services for application settings properties. This class cannot be inherited. + + + Initializes a new instance of the class. + A value that enumerates the services being requested. + + + Gets the set of special services that have been requested. + A value that results from using the logical OR operator to combine all the enumeration values corresponding to the requested services. + + + Used internally as the class that represents metadata about an individual configuration property. + + + Initializes a new instance of the class, based on the supplied parameter. + Specifies a copy of an existing object. + + + Initializes a new instance of the class. based on the supplied parameter. + Specifies the name of an existing object. + + + Creates a new instance of the class based on the supplied parameters. + The name of the object. + The type of object. + A object to use for persistence. + A value specifying whether the object is read-only. + The default value of the object. + A object. This object is an enumeration used to set the serialization scheme for storing application settings. + A object. + A Boolean value specifying whether an error will be thrown when the property is unsuccessfully deserialized. + A Boolean value specifying whether an error will be thrown when the property is unsuccessfully serialized. + + + Gets a object containing the attributes of the object. + A object. + + + Gets or sets the default value of the object. + An object containing the default value of the object. + + + Gets or sets a value specifying whether a object is read-only. + true if the is read-only; otherwise, false. + + + Gets or sets the name of the . + The name of the . + + + Gets or sets the type for the . + The type for the . + + + Gets or sets the provider for the . + A object. + + + Gets or sets a object for the . + A object. + + + Gets or sets a value specifying whether an error will be thrown when the property is unsuccessfully deserialized. + true if the error will be thrown when the property is unsuccessfully deserialized; otherwise, false. + + + Gets or sets a value specifying whether an error will be thrown when the property is unsuccessfully serialized. + true if the error will be thrown when the property is unsuccessfully serialized; otherwise, false. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + The collection is read-only. + + + Removes all objects from the collection. + The collection is read-only. + + + Creates a copy of the existing collection. + A class. + + + Copies this object to an array. + The array to copy the object to. + The index at which to begin copying. + + + Gets a value that specifies the number of objects in the collection. + The number of objects in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection. + + + Gets a value that indicates whether access to the collection is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets the collection item with the specified name. + The name of the object. + The object with the specified name. + + + Performs additional, custom processing when adding to the contents of the instance. + A object. + + + Performs additional, custom processing after adding to the contents of the instance. + A object. + + + Performs additional, custom processing when clearing the contents of the instance. + + + Performs additional, custom processing after clearing the contents of the instance. + + + Performs additional, custom processing when removing the contents of the instance. + A object. + + + Performs additional, custom processing after removing the contents of the instance. + A object. + + + Removes a object from the collection. + The name of the object. + The collection is read-only. + + + Sets the collection to be read-only. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Provides an exception for read-only objects. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on a supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class based on the supplied parameters. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class based on supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Provides an exception for objects that are not found. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class, based on a supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class, based on supplied parameters. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class, based on supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Contains the value of a settings property that can be loaded and stored by an instance of . + + + Initializes a new instance of the class, based on supplied parameters. + Specifies a object. + + + Gets or sets whether the value of a object has been deserialized. + true if the value of a object has been deserialized; otherwise, false. + + + Gets or sets whether the value of a object has changed. + true if the value of a object has changed; otherwise, false. + + + Gets the name of the property from the associated object. + The name of the object. + + + Gets the object. + The object that describes the object. + + + Gets or sets the value of the object. + The value of the object. When this value is set, the property is set to true and is set to false. When a value is first accessed from the property, and if the value was initially stored into the object as a serialized representation using the property, the property will trigger deserialization of the underlying value. As a side effect, the property will be set to true. If this chain of events occurs in ASP.NET, and if an error occurs during the deserialization process, the error is logged using the health-monitoring feature of ASP.NET. By default, this means that deserialization errors will show up in the Application Event Log when running under ASP.NET. If this process occurs outside of ASP.NET, and if an error occurs during deserialization, the error is suppressed, and the remainder of the logic during deserialization occurs. If there is no serialized value to deserialize when the deserialization is attempted, then object will instead attempt to return a default value if one was configured as defined on the associated instance. In this case, if the property was set to either null, or to the string "[null]", then the object will initialize the property to either null for reference types, or to the default value for the associated value type. On the other hand, if property holds a valid object reference or string value (other than "[null]"), then the property is returned instead. If there is no serialized value to deserialize when the deserialization is attempted, and no default value was specified, then an empty string will be returned for string types. For all other types, a default instance will be returned by calling — for reference types this means an attempt will be made to create an object instance using the default constructor. If this attempt fails, then null is returned. + While attempting to use the default value from the property, an error occurred. Either the attempt to convert property to a valid type failed, or the resulting value was not compatible with the type defined by . + + + Gets or sets the serialized value of the object. + The serialized value of a object. + The serialization options for the property indicated the use of a string type converter, but a type converter was not available. + + + Gets a Boolean value specifying whether the value of the object is the default value as defined by the property value on the associated object. + true if the value of the object is the default value; otherwise, false. + + + Contains a collection of settings property values that map objects to objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + An attempt was made to add an item to the collection, but the collection was marked as read-only. + + + Removes all objects from the collection. + + + Creates a copy of the existing collection. + A class. + + + Copies this collection to an array. + The array to copy the collection to. + The index at which to begin copying. + + + Gets a value that specifies the number of objects in the collection. + The number of objects in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection. + + + Gets a value that indicates whether access to the collection is synchronized (thread safe). + true if access to the collection is synchronized; otherwise, false. + + + Gets an item from the collection. + A object. + The object with the specified name. + + + Removes a object from the collection. + The name of the object. + An attempt was made to remove an item from the collection, but the collection was marked as read-only. + + + Sets the collection to be read-only. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Provides an exception that is thrown when an invalid type is used with a object. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on the supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class based on the supplied parameters. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class based on the supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Acts as a base class for deriving custom settings providers in the application settings architecture. + + + Initializes an instance of the class. + + + Gets or sets the name of the currently running application. + A that contains the application's shortened name, which does not contain a full path or extension, for example, SimpleAppSettings. + + + Returns the collection of settings property values for the specified application instance and settings property group. + A describing the current application use. + A containing the settings property group whose values are to be retrieved. + A containing the values for the specified settings property group. + + + Sets the values of the specified group of property settings. + A describing the current application usage. + A representing the group of property settings to set. + + + Specifies the settings provider used to provide storage for the current application settings class or property. This class cannot be inherited. + + + Initializes an instance of the class. + A containing the name of the settings provider. + + + Initializes a new instance of the class. + A containing the settings provider type. + + + Gets the type name of the settings provider. + A containing the name of the settings provider. + + + Represents a collection of application settings providers. + + + Initializes a new instance of the class. + + + Adds a new settings provider to the collection. + A to add to the collection. + The provider parameter is not of type . -or- The property of the provider parameter is null or an empty string. -or- A settings provider with the same already exists in the collection. + The collection is read-only. + The provider parameter is null. + + + Gets the settings provider in the collection that matches the specified name. + A containing the friendly name of the settings provider. + If found, the whose name matches that specified by the name parameter; otherwise, null. + The name parameter is null. + The collection is read-only when setting this value. + + + Represents the method that will handle the event. + The source of the event, typically a data container or data-bound collection. + A that contains the event data. + + + Determines the serialization scheme used to store application settings. + + + The settings property is serialized using binary object serialization. + + + + The settings provider has implicit knowledge of the property or its type and picks an appropriate serialization mechanism. Often used for custom serialization. + + + + The settings property is serialized as plain text. + + + + The settings property is serialized as XML using XML serialization. + + + + Specifies the serialization mechanism that the settings provider should use. This class cannot be inherited. + + + Initializes an instance of the class. + A enumerated value that specifies the serialization scheme. + + + Gets the enumeration value that specifies the serialization scheme. + A enumerated value that specifies the serialization scheme. + + + Contains the XML representing the serialized value of the setting. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Compares the current instance to the specified object. + The object to compare. + true if the instance is equal to the specified object; otherwise, false. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Gets or sets the value of a object by using an object. + An object containing the value of a . + + + Handles configuration sections that are represented by a single XML tag in the .config file. + + + Initializes a new instance of the class. + + + Used internally to create a new instance of this object. + The parent of this object. + The context of this object. + The object in the configuration. + The created object handler. + + + Specifies the special setting category of a application settings property. + + + The configuration property represents a connection string, typically for a data store or network resource. + + + + The configuration property represents a Uniform Resource Locator (URL) to a Web service. + + + + Indicates that an application settings property has a special significance. This class cannot be inherited. + + + Initializes a new instance of the class. + + + + Gets the value describing the special setting category of the application settings property. + A enumeration value defining the category of the application settings property. + + + Provides validation of a string. + + + Initializes a new instance of the class, based on a supplied parameter. + An integer that specifies the minimum length of the string value. + + + Initializes a new instance of the class, based on supplied parameters. + An integer that specifies the minimum length of the string value. + An integer that specifies the maximum length of the string value. + + + Initializes a new instance of the class, based on supplied parameters. + An integer that specifies the minimum length of the string value. + An integer that specifies the maximum length of the string value. + A string that represents invalid characters. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter matches a string; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + value is less than minValue or greater than maxValue as defined in the constructor. - or - value contains invalid characters. + + + Declaratively instructs the .NET Framework to perform string validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets the invalid characters for the property. + The string that contains the set of characters that are not allowed for the property. + + + Gets or sets the maximum length allowed for the string to assign to the property. + An integer that indicates the maximum allowed length for the string to assign to the property. + The selected value is less than . + + + Gets or sets the minimum allowed value for the string to assign to the property. + An integer that indicates the allowed minimum length for the string to assign to the property. + The selected value is greater than . + + + Gets an instance of the class. + A current settings in a validator instance. + + + Validates that an object is a derived class of a specified type. + + + Initializes a new instance of the class. + The base class to validate against. + baseClass is null. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter matches a type that can be validated; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + value is not of a that can be derived from baseClass as defined in the constructor. + + + Declaratively instructs the .NET Framework to perform validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + The base class type. + + + Gets the base type of the object being validated. + The base type of the object being validated. + + + Gets the validator attribute instance. + The current instance. + + + Converts a time span expressed in minutes. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The representing the value parameter in minutes. + + + Converts a expressed in minutes or as a standard infinite time span. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in minutes. + + + Converts a time span expressed in seconds. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The representing the data parameter in seconds. + data cannot be parsed as an integer value. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter in minutes. + + + Converts a expressed in seconds or as a standard infinite time span. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter in seconds. + + + Converts a to a. . + The object used for type conversions. + The object used during conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in seconds. + + + Provides validation of a object. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + A value that specifies whether the validation range is exclusive. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + A value that specifies whether the validation range is exclusive. + An value that specifies a number of seconds. + resolutionInSeconds is less than 0. - or - minValue is greater than maxValue. + + + Determines whether the type of the object can be validated. + The type of the object. + true if the type parameter matches a value; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Declaratively instructs the .NET Framework to perform time validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range as defined by and . + true if the value must be excluded; otherwise, false. The default is false. + + + Gets the absolute maximum value. + The allowed maximum value. + + + Gets or sets the relative maximum value. + The allowed maximum value. + The selected value represents less than . + + + Gets the absolute minimum value. + The allowed minimum value. + + + Gets or sets the relative minimum value. + The minimum allowed value. + The selected value represents more than . + + + Gets the absolute maximum value allowed. + + + + Gets the absolute minimum value allowed. + + + + Gets an instance of the class. + The validator instance. + + + Converts between type and string values. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Converts a object to a object. + The object used for type conversions. + The object used during conversion. + The object to convert. + The that represents the data parameter. + The value cannot be resolved. + + + Converts a object to a object. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter. + + + Represents the Uri section within a configuration file. + + + Initializes a new instance of the class. + + + Gets an object that contains the configuration setting for International Domain Name (IDN) processing in the class. + The configuration setting for International Domain Name (IDN) processing in the class. + + + Gets an object that contains the configuration setting for International Resource Identifiers (IRI) parsing in the class. + The configuration setting for International Resource Identifiers (IRI) parsing in the class. + + + Gets a object that contains the configuration settings for scheme parsing in the class. + The configuration settings for scheme parsing in the class + + + Specifies that an application settings group or property contains distinct values for each user of an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Represents a grouping of related user settings sections within a configuration file. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Represents a method to be called after the validation of an object. + + + + Converts a string to its canonical format. + + + Initializes a new instance of the class. + + + Converts a to canonical form. + The object used for type conversions. + The object used during conversion. + The object to convert. + An object representing the converted value. + + + Converts a to canonical form. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + An object representing the converted value. + + + Specifies the property of a configuration element. This class cannot be inherited. + + + Initializes a new instance of the class, based on a supplied parameter. + A object. + validator is null. + + + Gets a object used to validate the object. + A object. + + + The exception that is thrown when a configuration error has occurred. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The path to the configuration file that caused this exception to be thrown. + The line number within the configuration file at which this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of a class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The path to the configuration file that caused this exception to be thrown. + The line number within the configuration file at which this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The exception that caused this exception to be thrown. + + + Initializes a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + The current type is not a or a . + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The object that caused this exception to be thrown. + + + Gets a description of why this configuration exception was thrown. + A description of why this was thrown. + + + Gets a collection of errors that detail the reasons this exception was thrown. + An object that contains errors that identify the reasons this exception was thrown. + + + Gets the path to the configuration file that caused this configuration exception to be thrown. + The path to the configuration file that caused this to be thrown. + + + Gets the path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + The object that caused this exception to be thrown. + The path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + + + Gets the path to the configuration file that the internal was reading when this configuration exception was thrown. + The object that caused this exception to be thrown. + The path of the configuration file the internal object was accessing when the exception occurred. + + + Gets the line number within the configuration file that the internal object represented when this configuration exception was thrown. + The object that caused this exception to be thrown. + The line number within the configuration file that contains the object being parsed when this configuration exception was thrown. + + + Gets the line number within the configuration file that the internal object was processing when this configuration exception was thrown. + The object that caused this exception to be thrown. + The line number within the configuration file that the object was accessing when the exception occurred. + + + Sets the object with the file name and line number at which this configuration exception occurred. + The object that holds the information to be serialized. + The contextual information about the source or destination. + + + Gets the line number within the configuration file at which this configuration exception was thrown. + The line number within the configuration file at which this exception was thrown. + + + Gets an extended description of why this configuration exception was thrown. + An extended description of why this exception was thrown. + + + The exception that is thrown when a configuration system error has occurred. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + + + Initializes a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The that caused this to be thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + The that caused this to be thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The path to the configuration file that caused this to be thrown. + The line number within the configuration file at which this was thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + The path to the configuration file that caused this to be thrown. + The line number within the configuration file at which this was thrown. + + + Gets a description of why this configuration exception was thrown. + A description of why this exception was thrown. + + + Gets the path to the configuration file that caused this configuration exception to be thrown. + The path to the configuration file that caused this exception to be thrown. + + + Sets the object with the file name and line number at which this configuration exception occurred. + The object that holds the information to be serialized. + The contextual information about the source or destination. + + + Gets the path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + The that caused this exception to be thrown. + A string representing the node file name. + + + Gets the line number within the configuration file that the internal object represented when this configuration exception was thrown. + The that caused this exception to be thrown. + An int representing the node line number. + + + Gets the line number within the configuration file at which this configuration exception was thrown. + The line number within the configuration file at which this exception was thrown. + + + Gets an extended description of why this configuration exception was thrown. + An extended description of why this exception was thrown. + + + Defines the configuration file mapping for the machine configuration file. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on the supplied parameter. + The name of the machine configuration file. + + + Creates a copy of the existing object. + A object. + + + Gets or sets the name of the machine configuration file name. + The machine configuration file name. + + + Represents a location element within a configuration file. + + + Creates an instance of a Configuration object. + A Configuration object. + + + Gets the relative path to the resource whose configuration settings are represented by this object. + The relative path to the resource whose configuration settings are represented by this . + + + Contains a collection of objects. + + + Gets the object at the specified index. + The index location of the to return. + The at the specified index. + + + Contains a collection of locked configuration objects. This class cannot be inherited. + + + Locks a configuration object by adding it to the collection. + The name of the configuration object. + Occurs when the name does not match an existing configuration object within the collection. + + + Gets a list of configuration objects contained in the collection. + A comma-delimited string that lists the lock configuration objects in the collection. + + + Clears all configuration objects from the collection. + + + Verifies whether a specific configuration object is locked. + The name of the configuration object to verify. + true if the contains the specified configuration object; otherwise, false. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in array at which copying begins. + + + Gets the number of locked configuration objects contained in the collection. + The number of locked configuration objects contained in the collection. + + + Gets an object, which is used to iterate through this collection. + An object. + + + Gets a value specifying whether the collection of locked objects has parent elements. + true if the collection has parent elements; otherwise, false. + + + Gets a value specifying whether the collection has been modified. + true if the collection has been modified; otherwise, false. + + + Verifies whether a specific configuration object is read-only. + The name of the configuration object to verify. + true if the specified configuration object in the collection is read-only; otherwise, false. + The specified configuration object is not in the collection. + + + Gets a value specifying whether the collection is synchronized. + true if the collection is synchronized; otherwise, false. + + + Removes a configuration object from the collection. + The name of the configuration object. + Occurs when the name does not match an existing configuration object within the collection. + + + Locks a set of configuration objects based on the supplied list. + A comma-delimited string. + Occurs when an item in the attributeList parameter is not a valid lockable configuration attribute. + + + Gets an object used to synchronize access to this collection. + An object used to synchronize access to this collection. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the collection. The must have zero-based indexing. + The zero-based index in array at which copying begins. + + + Provides access to configuration files for client applications. This class cannot be inherited. + + + Gets the data for the current application's default configuration. + Returns a object that contains the contents of the object for the current application's default configuration. + Could not retrieve a object with the application settings data. + + + Gets the data for the current application's default configuration. + Returns a object that contains the contents of the object for the current application's default configuration. + Could not retrieve a object. + + + Retrieves a specified configuration section for the current application's default configuration. + The configuration section path and name. + The specified object, or null if the section does not exist. + A configuration file could not be loaded. + + + Opens the configuration file for the current application as a object. + The for which you are opening the configuration. + A object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object. + The path of the executable (exe) file. + A object. + A configuration file could not be loaded. + + + Opens the machine configuration file on the current computer as a object. + A object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object that uses the specified file mapping and user level. + An object that references configuration file to use instead of the application default configuration file. + The object for which you are opening the configuration. + The configuration object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object that uses the specified file mapping, user level, and preload option. + An object that references the configuration file to use instead of the default application configuration file. + The object for which you are opening the configuration. + true to preload all section groups and sections; otherwise, false. + The configuration object. + A configuration file could not be loaded. + + + Opens the machine configuration file as a object that uses the specified file mapping. + An object that references configuration file to use instead of the application default configuration file. + A object. + A configuration file could not be loaded. + + + Refreshes the named section so the next time that it is retrieved it will be re-read from disk. + The configuration section name or the configuration path and section name of the section to refresh. + + + Represents an attribute or a child of a configuration element. This class cannot be inherited. + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + The description of the configuration entity. + + + Gets the used to convert this into an XML representation for writing to the configuration file. + A used to convert this into an XML representation for writing to the configuration file. + This cannot be converted. + + + Gets the default value for this property. + An that can be cast to the type specified by the property. + + + Gets the description associated with the . + A string value that describes the property. + + + Indicates whether the assembly name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + true if the property requires assembly name transformation; otherwise, false. + + + Gets a value that indicates whether the property is the default collection of an element. + true if the property is the default collection of an element; otherwise, false. + + + Gets a value indicating whether this is the key for the containing object. + true if this object is the key for the containing element; otherwise, false. The default is false. + + + Gets a value indicating whether this is required. + true if the is required; otherwise, false. The default is false. + + + Indicates whether the type name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + true if the property requires type-name transformation; otherwise, false. + + + Indicates whether the configuration property's parent configuration section is queried at serialization time to determine whether the configuration property should be serialized into XML. + true if the parent configuration section should be queried; otherwise, false. + + + Gets the name of this . + The name of the . + + + Gets the type of this object. + A representing the type of this object. + + + Gets the , which is used to validate this object. + The validator, which is used to validate this . + + + Declaratively instructs the .NET Framework to instantiate a configuration property. This class cannot be inherited. + + + Initializes a new instance of class. + Name of the object defined. + + + Gets or sets the default value for the decorated property. + The object representing the default value of the decorated configuration-element property. + + + Gets or sets a value indicating whether this is the default property collection for the decorated configuration property. + true if the property represents the default collection of an element; otherwise, false. The default is false. + + + Gets or sets a value indicating whether this is a key property for the decorated element property. + true if the property is a key property for an element of the collection; otherwise, false. The default is false. + + + Gets or sets a value indicating whether the decorated element property is required. + true if the property is required; otherwise, false. The default is false. + + + Gets the name of the decorated configuration-element property. + The name of the decorated configuration-element property. + + + Gets or sets the for the decorated configuration-element property. + One of the enumeration values associated with the property. + + + Represents a collection of configuration-element properties. + + + Initializes a new instance of the class. + + + Adds a configuration property to the collection. + The to add. + + + Removes all configuration property objects from the collection. + + + Specifies whether the configuration property is contained in this collection. + An identifier for the to verify. + true if the specified is contained in the collection; otherwise, false. + + + Copies this ConfigurationPropertyCollection to an array. + Array to which to copy. + Index at which to begin copying. + + + Gets the number of properties in the collection. + The number of properties in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets the collection item with the specified name. + The to return. + The with the specified name. + + + Removes a configuration property from the collection. + The to remove. + true if the specified was removed; otherwise, false. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Copies this collection to an array. + The array to which to copy. + The index location at which to begin copying. + + + Specifies the options to apply to a property. + + + Indicates whether the assembly name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + + + + Indicates that the property is a default collection. + + + + Indicates that the property is a collection key. + + + + Indicates that the property is required. + + + + Indicates whether the type name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + + + + Indicates whether the configuration property's parent configuration section should be queried at serialization time to determine whether the configuration property should be serialized into XML. + + + + Indicates that no option applies to the property. + + + + Determines which properties are written out to a configuration file. + + + Causes all properties to be written to the configuration file. This is useful mostly for creating information configuration files or moving configuration values from one machine to another. + + + + Causes only properties that differ from inherited values to be written to the configuration file. + + + + Causes only modified properties to be written to the configuration file, even when the value is the same as the inherited value. + + + + Represents a section within a configuration file. + + + Initializes a new instance of the class. + + + Reads XML from the configuration file. + The object, which reads from the configuration file. + reader found no elements in the configuration file. + + + Returns a custom object when overridden in a derived class. + The object representing the section. + + + Indicates whether this configuration element has been modified since it was last saved or loaded when implemented in a derived class. + true if the element has been modified; otherwise, false. + + + Resets the value of the method to false when implemented in a derived class. + + + Gets a object that contains the non-customizable information and functionality of the object. + A that contains the non-customizable information and functionality of the . + + + Creates an XML string containing an unmerged view of the object as a single section to write to a file. + The instance to use as the parent when performing the un-merge. + The name of the section to create. + The instance to use when writing to a string. + An XML string containing an unmerged view of the object. + + + Indicates whether the specified element should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The object that is a candidate for serialization. + The name of the object as it occurs in XML. + The target version of the .NET Framework. + true if the element should be serialized; otherwise, false. + + + Indicates whether the specified property should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The object that is a candidate for serialization. + The name of the object as it occurs in XML. + The target version of the .NET Framework. + The parent element of the property. + true if the property should be serialized; otherwise, false. + + + Indicates whether the current instance should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The target version of the .NET Framework. + true if the current section should be serialized; otherwise, false. + + + Represents a collection of related sections within a configuration file. + + + Adds a object to the object. + The name of the section to be added. + The section to be added. + + + Clears this object. + + + Copies this object to an array. + The array to copy the object to. + The index location at which to begin copying. + array is null. + The length of array is less than the value of plus index. + + + Gets the number of sections in this object. + An integer that represents the number of sections in the collection. + + + Gets the specified object contained in this object. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object contained in this object. + The name of the object to be returned. + The object with the specified name. + name is null or an empty string (""). + + + Gets an enumerator that can iterate through this object. + An that can be used to iterate through this object. + + + Gets the key of the specified object contained in this object. + The index of the object whose key is to be returned. + The key of the object at the specified index. + + + Used by the system during serialization. + The applicable object. + The applicable object. + + + Gets the specified object. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object. + The name of the object to be returned. + The object with the specified name. + + + Gets the keys to all objects contained in this object. + A object that contains the keys of all sections in this collection. + + + Removes the specified object from this object. + The name of the section to be removed. + + + Removes the specified object from this object. + The index of the section to be removed. + + + Represents a group of related sections within a configuration file. + + + Initializes a new instance of the class. + + + Forces the declaration for this object. + + + Forces the declaration for this object. + + The object is the root section group. - or - The object has a location. + + + Gets a value that indicates whether this object declaration is required. + true if this declaration is required; otherwise, false. + + + Gets a value that indicates whether this object is declared. + true if this is declared; otherwise, false. The default is false. + + + Gets the name property of this object. + The name property of this object. + + + Gets the section group name associated with this . + The section group name of this object. + + + Gets a object that contains all the objects that are children of this object. + A object that contains all the objects that are children of this object. + + + Gets a object that contains all of objects within this object. + A object that contains all the objects within this object. + + + Indicates whether the current instance should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The target version of the .NET Framework. + true if the current section group should be serialized; otherwise, false. + + + Gets or sets the type for this object. + The type of this object. + The object is the root section group. - or - The object has a location. + The section or group is already defined at another level. + + + Represents a collection of objects. + + + Adds a object to this object. + The name of the object to be added. + The object to be added. + + + Clears the collection. + + + Copies this object to an array. + The array to copy the object to. + The index location at which to begin copying. + array is null. + The length of array is less than the value of plus index. + + + Gets the number of section groups in the collection. + An integer that represents the number of section groups in the collection. + + + Gets the specified object contained in the collection. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object from the collection. + The name of the object to be returned. + The object with the specified name. + name is null or an empty string (""). + + + Gets an enumerator that can iterate through the object. + An that can be used to iterate through the object. + + + Gets the key of the specified object contained in this object. + The index of the section group whose key is to be returned. + The key of the object at the specified index. + + + Used by the system during serialization. + The applicable object. + The applicable object. + + + Gets the object whose index is specified from the collection. + The index of the object to be returned. + The object at the specified index. In C#, this property is the indexer for the class. + + + Gets the object whose name is specified from the collection. + The name of the object to be returned. + The object with the specified name. In C#, this property is the indexer for the class. + + + Gets the keys to all objects contained in this object. + A object that contains the names of all section groups in this collection. + + + Removes the object whose name is specified from this object. + The name of the section group to be removed. + + + Removes the object whose index is specified from this object. + The index of the section group to be removed. + + + Provides runtime versions 1.0 and 1.1 support for reading configuration sections and common configuration settings. + + + Gets a read-only of the application settings section of the configuration file. + A read-only of the application settings section from the configuration file. + + + Returns the object for the passed configuration section name and path. + A configuration name and path, such as "system.net/settings". +

The object for the passed configuration section name and path.

+


The class provides backward compatibility only. You should use the class or class instead.

+

+
+ Unable to retrieve the requested section. +
+ + Used to specify which configuration file is to be represented by the Configuration object. + + + Get the that applies to all users. + + + + Get the roaming that applies to the current user. + + + + Get the local that applies to the current user. + + + + Serves as the base class for the validator attribute types. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified validator type. + The validator type to use when creating an instance of . + validator is null. + validator is not derived from . + + + Gets the validator attribute instance. + The current . + + + Gets the type of the validator attribute. + The of the current validator attribute instance. + + + Acts as a base class for deriving a validation class so that a value of an object can be verified. + + + Initializes an instance of the class. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter value matches the expected type; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + + + Wraps the corresponding type and also carries the necessary information for reporting file-name and line numbers. + + + Initializes a new instance of the class. + + + Creates a configuration element attribute. + The prefix definition. + The name that is used locally. + The URL that is assigned to the namespace. + The attribute. + + + Creates an XML CData section. + The data to use. + The value. + + + Create an XML comment. + + The value. + + + Creates a configuration element. + The prefix definition. + The name used locally. + The namespace for the URL. + The value. + + + Creates white spaces. + The data to use. + The value. + + + Create a text node. + The text to use. + The value. + + + Creates white space. + The data to use. + The value. + + + Gets the configuration file name. + The configuration file name. + + + Gets the current node line number. + The line number for the current node. + + + Loads the configuration file. + The name of the file. + + + Loads a single configuration element. + The name of the file. + The source for the reader. + + + Gets the configuration file name. + The file name. + + + Gets the configuration line number. + The line number. + + + Represents a single, named connection string in the connection strings configuration file section. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class. + The name of the connection string. + The connection string. + + + Initializes a new instance of a object. + The name of the connection string. + The connection string. + The name of the provider to use with the connection string. + + + Gets or sets the connection string. + The string value assigned to the property. + + + Gets or sets the name. + The string value assigned to the property. + + + Gets or sets the provider name property. + Gets or sets the property. + + + Returns a string representation of the object. + A string representation of the object. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object to add to the collection. + + + Removes all the objects from the collection. + + + Returns the collection index of the passed object. + A object in the collection. + The collection index of the specified object. + + + Gets or sets the connection string at the specified index in the collection. + The index of a object in the collection. + The object at the specified index. + + + Gets or sets the object with the specified name in the collection. + + The object with the specified name; otherwise, null. + + + Removes the specified object from the collection. + A object in the collection. + + + Removes the specified object from the collection. + The name of a object in the collection. + + + Removes the object at the specified index in the collection. + The index of a object in the collection. + + + Provides programmatic access to the connection strings configuration-file section. + + + Initializes a new instance of the class. + + + Gets a collection of objects. + A collection of objects. + + + Encapsulates the context information that is associated with a object. This class cannot be inherited. + + + Provides an object containing configuration-section information based on the specified section name. + The name of the configuration section. + An object containing the specified section within the configuration. + + + Gets the context of the environment where the configuration property is being evaluated. + An object specifying the environment where the configuration property is being evaluated. + + + Gets a value specifying whether the configuration property is being evaluated at the machine configuration level. + true if the configuration property is being evaluated at the machine configuration level; otherwise, false. + + + Represents a basic configuration-section handler that exposes the configuration section's XML for both read and write access. + + + Initializes a new instance of the class. + + + Specifies the default value for an application settings property. + + + Initializes an instance of the class. + A that represents the default value for the property. + + + Gets the default value for the application settings property. + A that represents the default value for the property. + + + Provides validation of an object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether an object can be validated, based on type. + The object type. + true for all types being validated. + + + Determines whether the value of an object is valid. + The object value. + + + Provides key/value pair configuration information from a configuration section. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + Parent object. + Configuration context object. + Section XML node. + A configuration object. + + + Gets the XML attribute name to use as the key in a key/value pair. + A string value containing the name of the key attribute. + + + Gets the XML attribute name to use as the value in a key/value pair. + A string value containing the name of the value attribute. + + + Defines an interface used by the .NET Framework to initialize configuration properties. + + + Gets the configuration file name related to the application path. + A string value representing a configuration file name. + + + Gets the local configuration directory of the application based on the entry assembly. + A string representing the local configuration directory. + + + Gets the local configuration path of the application based on the entry assembly. + A string value representing the local configuration path of the application. + + + Gets the product name of the application based on the entry assembly. + A string value representing the product name of the application. + + + Gets the product version of the application based on the entry assembly. + A string value representing the product version of the application. + + + Gets the roaming configuration directory of the application based on the entry assembly. + A string value representing the roaming configuration directory of the application. + + + Gets the roaming user's configuration path based on the application's entry assembly. + A string value representing the roaming user's configuration path. + + + Gets the configuration path for the Machine.config file. + A string value representing the path of the Machine.config file. + + + Gets a value representing the configuration system's status. + true if the configuration system is in the process of being initialized; otherwise, false. + + + Gets a value that specifies whether user configuration settings are supported. + true if the configuration system supports user configuration settings; otherwise, false. + + + Gets the name of the file used to store user configuration settings. + A string specifying the name of the file used to store user configuration. + + + Defines interfaces that allow the internal .NET Framework infrastructure to customize configuration. + + + Returns the path to the application configuration file. + A string representing the path to the application configuration file. + + + Returns a string representing the path to the known local user configuration file. + A string representing the path to the known local user configuration file. + + + Returns a string representing the path to the known roaming user configuration file. + A string representing the path to the known roaming user configuration file. + + + Returns a value indicating whether a configuration file path is the same as a currently known application configuration file path. + A string representing the path to the application configuration file. + true if a string representing a configuration path is the same as a path to the application configuration file; false if a string representing a configuration path is not the same as a path to the application configuration file. + + + Returns a value indicating whether a configuration file path is the same as the configuration file path for the currently known local user. + A string representing the path to the application configuration file. + true if a string representing a configuration path is the same as a path to a known local user configuration file; otherwise, false. + + + Returns a value indicating whether a configuration file path is the same as the configuration file path for the currently known roaming user. + A string representing the path to an application configuration file. + true if a string representing a configuration path is the same as a path to a known roaming user configuration file; otherwise, false. + + + Defines the interfaces used by the internal design time API to create a object. + + + Creates and initializes a object. + The of the object to be created. + A parameter array of that contains the parameters to be applied to the created object. + A object. + + + Normalizes a location subpath of a path to a configuration file. + A string representing the path to the configuration file. + An instance of or null. + A normalized subpath string. + + + Defines interfaces used by internal .NET structures to initialize application configuration properties. + + + Creates and returns a context object for a of an application configuration. + A string representing the path of the application configuration file. + A string representing a subpath location of the configuration element. + A context object for a object of an application configuration. + + + Creates and returns a deprecated context object of the application configuration. + A string representing a path to an application configuration file. + A deprecated context object of the application configuration. + + + Decrypts an encrypted configuration section and returns it as a string. + An encrypted XML string representing a configuration section. + The object. + + A decrypted configuration section as a string. + + + Deletes the object performing I/O tasks on the application configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + + + Encrypts a configuration section and returns it as a string. + + The object. + + An encrypted configuration section represented as a string. + + + Returns the complete path to an application configuration file based on the location subpath. + A string representing the path of the application configuration file. + + A string representing the complete path to an application configuration file. + + + Returns a object representing the type of the configuration object. + The type name + true to throw an exception if an error occurs; otherwise, false + A object representing the type of the configuration object. + + + Returns a string representing a type name from the object representing the type of the configuration. + A object. + A string representing the type name from a object representing the type of the configuration. + + + Returns a string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + A string representing the path of the application configuration file. + A string representing the configuration file name associated with the I/O tasks on the configuration file. + + + Returns a string representing the configuration file name associated with the object performing I/O tasks on a remote configuration file. + A string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + A string representing a path to a remote configuration file. + A string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + + + Returns the version of the object associated with configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + The version of the object associated with configuration file. + + + Instructs the host to impersonate and returns an object required by the internal .NET structure. + An value. + + + Initializes a configuration host. + + The parameter object containing the values used for initializing the configuration host. + + + Initializes a configuration object. + The subpath location of the configuration file. + A string representing the path of the application configuration file. + A string representing the location of a configuration path. + + The parameter object containing the values used for initializing the configuration host. + + + Returns a value indicating whether the configuration file is located at a higher level in the configuration hierarchy than the application configuration. + A string representing the path of the application configuration file. + true the configuration file is located at a higher level in the configuration hierarchy than the application configuration; otherwise, false. + + + Returns a value indicating whether a child record is required for a child configuration path. + A string representing the path of the application configuration file. + true if child record is required for a child configuration path; otherwise, false. + + + Determines if a different definition is allowable for an application configuration object. + A string representing the path of the application configuration file. + A object. + A object. + true if a different definition is allowable for an application configuration object; otherwise, false. + + + Returns a value indicating whether the file path used by a object to read a configuration file is a valid path. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the path used by a object to read a configuration file is a valid path; otherwise, false. + + + Returns a value indicating whether a configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands. + The object. + true if the configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands; otherwise, false. + + + Returns a value indicating whether the initialization of a configuration object is considered delayed. + The object. + true if the initialization of a configuration object is considered delayed; otherwise, false. + + + Returns a value indicating whether the configuration object supports a location tag. + A string representing the path of the application configuration file. + true if the configuration object supports a location tag; otherwise, false. + + + Returns a value indicating whether the configuration is remote. + true if the configuration is remote; otherwise, false. + + + Returns a value indicating whether a configuration path is to a configuration node whose contents should be treated as a root. + A string representing the path of the application configuration file. + true if the configuration path is to a configuration node whose contents should be treated as a root; otherwise, false. + + + Returns a value indicating whether the configuration path is trusted. + A string representing the path of the application configuration file. + true if the configuration path is trusted; otherwise, false. + + + Opens a to read a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object. + + + Opens a object to read a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Opens a object for writing to a configuration file or for writing to a temporary file used to build a configuration file. Allows a object to be designated as a template for copying file attributes. + A string representing the name of the object performing I/O tasks on the configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object. + A object. + + + Opens a object for writing to a configuration file. Allows a object to be designated as a template for copying file attributes. + A string representing the name of the object performing I/O tasks on the configuration file. + The name of a from which file attributes are to be copied as a template. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Returns a value indicating whether the entire configuration file could be read by a designated object. + A string representing the path of the application configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the entire configuration file could be read by the object designated by streamName; otherwise, false. + + + Instructs the object to read a designated section of its associated configuration file. + A string representing the identifying name of a configuration file section group. + A string representing the identifying name of a configuration file section. + true if a section of the configuration file designated by sectionGroupName and sectionName could be read by a object; otherwise, false. + + + Indicates a new configuration record requires a complete initialization. + An object. + + + Instructs the object to monitor an associated object for changes in a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object to receive the returned data representing the changes in the configuration file. + An containing changed configuration settings. + + + Instructs the object to stop monitoring an associated object for changes in a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object. + + + Returns a value indicating whether the host configuration supports change notification. + true if the configuration supports change notification; otherwise, false. + + + Returns a value indicating whether the host configuration supports location tags. + true if the configuration supports location tags; otherwise, false. + + + Returns a value indicating whether the host configuration supports path tags. + true if the configuration supports path tags; otherwise, false. + + + Returns a value indicating whether the host configuration supports configuration refresh. + true if the configuration supports configuration refresh; otherwise, false. + + + Verifies that a configuration definition is allowed for a configuration record. + A string representing the path of the application configuration file. + A object. + A object + An object. + + + Indicates that all writing to the configuration file has completed. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the write to the configuration file was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + + + Indicates that all writing to the configuration file has completed and specifies whether permissions should be asserted. + A string representing the name of the object performing I/O tasks on the configuration file. + true to indicate the write was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + + + Defines interfaces used by internal .NET structures to support creation of new configuration records. + + + Gets a string representing a configuration file path. + A string representing a configuration file path. + + + Returns an object representing a section of a configuration from the last-known-good (LKG) configuration. + A string representing a key to a configuration section. + An instance representing the section of the last-known-good configuration specified by configKey. + + + Returns an instance representing a section of a configuration file. + A string representing a key to a configuration section. + An instance representing a section of a configuration file. + + + Returns a value indicating whether an error occurred during initialization of a configuration object. + true if an error occurred during initialization of a configuration object; otherwise, false. + + + Causes a specified section of the configuration object to be reinitialized. + A string representing a key to a configuration section that is to be refreshed. + + + Removes a configuration record. + + + Returns the name of a object performing I/O tasks on the configuration file. + A string representing the name of a object performing I/O tasks on the configuration file. + + + Grants the configuration object the permission to throw an exception if an error occurs during initialization. + + + Defines interfaces used by internal .NET structures to support a configuration root object. + + + Represents the method that handles the event of an object. + + + + Represents the method that handles the event of a object. + + + + Returns an object representing a configuration specified by a configuration path. + A string representing the path to a configuration file. + An object representing a configuration specified by configPath. + + + Returns an representing the data in a section of a configuration file. + A string representing a section of a configuration file. + A string representing the path to a configuration file. + An representing the data in a section of a configuration file. + + + Returns a value representing the file path of the nearest configuration ancestor that has configuration data. + The path of configuration file. + Returns a string representing the file path of the nearest configuration ancestor that has configuration data. + + + Returns an object representing a unique configuration record for given configuration path. + The path of the configuration file. + An object representing a unique configuration record for a given configuration path. + + + Initializes a configuration object. + An object. + true if design time; false if run time. + + + Returns a value indicating whether the configuration is a design-time configuration. + true if the configuration is a design-time configuration; false if the configuration is not a design-time configuration. + + + Finds and removes a configuration record and all its children for a given configuration path. + The path of the configuration file. + + + Defines an interface used by the configuration system to set the class. + + + Indicates that initialization of the configuration system has completed. + + + Provides hierarchical configuration settings and extensions specific to ASP.NET to the configuration system. + An object used by the class. + true if the initialization process of the configuration system is complete; otherwise, false. + + + Defines an interface used by the .NET Framework to initialize application configuration properties. + + + Returns the configuration object based on the specified key. + The configuration key value. + A configuration object. + + + Refreshes the configuration system based on the specified section name. + The name of the configuration section. + + + Gets a value indicating whether the user configuration is supported. + true if the user configuration is supported; otherwise, false. + + + Defines a class that allows the .NET Framework infrastructure to specify event arguments for configuration events. + + + Initializes a new instance of the class. + A configuration path. + + + Gets or sets the configuration path related to the object. + A string value specifying the configuration path. + + + Defines a class used by the .NET Framework infrastructure to support configuration events. + The source object of the event. + A configuration event argument. + + + Represents a method for hosts to call when a monitored stream has changed. + The name of the object performing I/O tasks on the configuration file. + + + Defines standard functionality for controls or libraries that store and retrieve application settings. + + + Reads the control's application settings into their corresponding properties and updates the control's state. + + + Resets the control's application settings properties to their default values. + + + Persists the control's application settings properties. + + + Gets or sets a value indicating whether the control should automatically persist its application settings properties. + true if the control should automatically persist its state; otherwise, false. + + + Gets or sets the value of the application settings key for the current instance of the control. + A containing the settings key for the current instance of the control. + + + Provides the configuration setting for International Resource Identifier (IRI) processing in the class. + + + Initializes a new instance of the class. + + + Gets or sets the value of the configuration setting. + A Boolean that indicates if International Resource Identifier (IRI) processing is enabled. + + + Provides an interface for defining an alternate application settings provider. + + + Returns the settings provider compatible with the specified settings property. + The that requires serialization. + If found, the that can persist the specified settings property; otherwise, null. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection based on the supplied parameters. + A . + + + Adds a object to the collection based on the supplied parameters. + A string specifying the key. + A string specifying the value. + + + Gets the keys to all items contained in the collection. + A string array. + + + Clears the collection. + + + When overridden in a derived class, the method creates a new object. + A newly created . + + + Gets the element key for a specified configuration element when overridden in a derived class. + The to which the key should be returned. + An object that acts as the key for the specified . + + + Gets the object based on the supplied parameter. + The key of the contained in the collection. + A configuration element, or null if the key does not exist in the collection. + + + Gets a collection of configuration properties. + A collection of configuration properties. + + + Removes a object from the collection. + A string specifying the key. + + + Gets a value indicating whether an attempt to add a duplicate object to the collection will cause an exception to be thrown. + true if an attempt to add a duplicate to the will cause an exception to be thrown; otherwise, false. + + + Represents a configuration element that contains a key/value pair. + + + Initializes a new instance of the class based on the supplied parameters. + The key of the . + The value of the . + + + Sets the object to its initial state. + + + Gets the key of the object. + The key of the . + + + Gets the collection of properties. + The of properties for the element. + + + Gets or sets the value of the object. + The value of the . + + + Provides persistence for application settings classes. + + + Initializes a new instance of the class. + + + Gets or sets the name of the currently running application. + A string that contains the application's display name. + + + Returns the value of the named settings property for the previous version of the same application. + A that describes where the application settings property is used. + The whose value is to be returned. + A representing the application setting if found; otherwise, null. + + + Returns the collection of setting property values for the specified application instance and settings property group. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + A containing the values for the specified settings property group. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. + + + Initializes the provider. + The friendly name of the provider. + A collection of the name/value pairs representing the provider-specific attributes specified in the configuration for this provider. + + + Resets all application settings properties associated with the specified application to their default values. + A describing the current application usage. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. + + + Sets the values of the specified group of property settings. + A describing the current application usage. + A representing the group of property settings to set. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. -or- There was a general failure saving the settings to the configuration file. + + + Attempts to migrate previous user-scoped settings from a previous version of the same application. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. -or- The previous version of the configuration file could not be accessed. + + + Provides validation of an value. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + A value that specifies whether the validation range is exclusive. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + A value that specifies whether the validation range is exclusive. + An value that specifies a specific value that must be matched. + resolution is equal to or less than 0. - or - maxValue is less than minValue. + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches an value; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Declaratively instructs the .NET Framework to perform long-integer validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range defined by the and property values. + true if the value must be excluded; otherwise, false. The default is false. + + + Gets or sets the maximum value allowed for the property. + A long integer that indicates the allowed maximum value. + The selected value is less than . + + + Gets or sets the minimum value allowed for the property. + An integer that indicates the allowed minimum value. + The selected value is greater than . + + + Gets an instance of the class. + The validator instance. + + + Contains a collection of objects. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + + + Gets the keys to all items contained in the . + A string array. + + + Clears the . + + + Gets or sets the object based on the supplied parameter. + The name of the contained in the collection. + A object. + + + Removes a object from the collection based on the provided parameter. + A object. + + + Removes a object from the collection based on the provided parameter. + The name of the object. + + + A configuration element that contains a name and value. This class cannot be inherited. + + + Initializes a new instance of the class based on supplied parameters. + The name of the object. + The value of the object. + + + Gets the name of the object. + The name of the object. + + + Gets or sets the value of the object. + The value of the object. + + + Provides access to a configuration file. This type supports the .NET Framework configuration infrastructure and is not intended to be used directly from your code. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + The parent object. + The configuration context object. + The section XML node. + A configuration object. + The file specified in the file attribute of section exists but cannot be loaded. - or - The name attribute of section does not match the root element of the file specified in the file attribute. + + + Provides name/value-pair configuration information from a configuration section. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + Parent object. + Configuration context object. + Section XML node. + A configuration object. + + + Gets the XML attribute name to use as the key in a key/value pair. + A value containing the name of the key attribute. + + + Gets the XML attribute name to use as the value in a key/value pair. + A value containing the name of the value attribute. + + + Specifies that a settings provider should disable any logic that gets invoked when an application upgrade is detected. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Specifies the override behavior of a configuration element for configuration elements in child directories. + + + The configuration setting of the element or group can be overridden by configuration settings that are in child directories. + + + + The configuration setting of the element or group cannot be overridden by configuration settings that are in child directories. + + + + The configuration setting of the element or group will be overridden by configuration settings that are in child directories if explicitly allowed by a parent element of the current configuration element or group. Permission to override is specified by using the OverrideMode attribute. + + + + Provides validation of a object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the object type can be validated. + The object type. + true if the type parameter matches a object; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + value is null. + value cannot be resolved as a positive value. + + + Declaratively instructs the .NET Framework to perform time validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets an instance of the class. + The validator instance. + + + Contains meta-information on an individual property within the configuration. This type cannot be inherited. + + + Gets the object related to the configuration attribute. + A object. + + + Gets an object containing the default value related to a configuration attribute. + An object containing the default value of the configuration attribute. + + + Gets the description of the object that corresponds to a configuration attribute. + The description of the configuration attribute. + + + Gets a value specifying whether the configuration attribute is a key. + true if the configuration attribute is a key; otherwise, false. + + + Gets a value specifying whether the configuration attribute is locked. + true if the object is locked; otherwise, false. + + + Gets a value specifying whether the configuration attribute has been modified. + true if the object has been modified; otherwise, false. + + + Gets a value specifying whether the configuration attribute is required. + true if the object is required; otherwise, false. + + + Gets the line number in the configuration file related to the configuration attribute. + A line number of the configuration file. + + + Gets the name of the object that corresponds to a configuration attribute. + The name of the object. + + + Gets the source file that corresponds to a configuration attribute. + The source file of the object. + + + Gets the of the object that corresponds to a configuration attribute. + The of the object. + + + Gets a object related to the configuration attribute. + A object. + + + Gets or sets an object containing the value related to a configuration attribute. + An object containing the value for the object. + + + Gets a object related to the configuration attribute. + A object. + + + Contains a collection of objects. This class cannot be inherited. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the collection. The must have zero-based indexing. + The zero-based index in array at which copying begins. + array is null. + The property of array is less than + index. + + + Gets an object, which is used to iterate through this collection. + An object, which is used to iterate through this . + + + Populates a object with the data needed to serialize the instance. + A object that contains the information required to serialize the instance. + A object that contains the source and destination of the serialized stream associated with the instance. + info is null. + + + Gets the object in the collection, based on the specified property name. + The name of the configuration attribute contained in the object. + A object. + + + Specifies the level in the configuration hierarchy where a configuration property value originated. + + + The configuration property value originates from the property. + + + + The configuration property value is inherited from a parent level in the configuration. + + + + The configuration property value is defined at the current level of the hierarchy. + + + + Provides access to the protected-configuration providers for the current application's configuration file. + + + The name of the data protection provider. + + + + Gets the name of the default protected-configuration provider. + The name of the default protected-configuration provider. + + + The name of the protected data section. + + + + Gets a collection of the installed protected-configuration providers. + A collection of installed objects. + + + The name of the RSA provider. + + + + Specifies that an application settings property has a common value for all users of an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Acts as a base class for deriving concrete wrapper classes to implement the application settings feature in Window Forms applications. + + + Initializes an instance of the class to its default state. + + + Initializes an instance of the class using the supplied owner component. + The component that will act as the owner of the application settings object. + owner is null. + + + Initializes an instance of the class using the supplied settings key. + A that uniquely identifies separate instances of the wrapper class. + + + Initializes an instance of the class using the supplied owner component and settings key. + The component that will act as the owner of the application settings object. + A that uniquely identifies separate instances of the wrapper class. + owner is null. + + + Gets the application settings context associated with the settings group. + A associated with the settings group. + + + Returns the value of the named settings property for the previous version of the same application. + A containing the name of the settings property whose value is to be returned. + An containing the value of the specified if found; otherwise, null. + The property does not exist. The property count is zero or the property cannot be found in the data store. + + + Gets or sets the value of the specified application settings property. + A containing the name of the property to access. + If found, the value of the named settings property; otherwise, null. + There are no properties associated with the current wrapper or the specified property could not be found. + An attempt was made to set a read-only property. + The value supplied is of a type incompatible with the settings property, during a set operation. + The configuration file could not be parsed. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Gets the collection of settings properties in the wrapper. + A containing all the objects used in the current wrapper. + The associated settings provider could not be found or its instantiation failed. + + + Occurs after the value of an application settings property is changed. + + + + Gets a collection of property values. + A of property values. + + + Gets the collection of application settings providers used by the wrapper. + A containing all the objects used by the settings properties of the current settings wrapper. + + + Refreshes the application settings property values from persistent storage. + + + Restores the persisted application settings values to their corresponding default properties. + The configuration file could not be parsed. + + + Stores the current values of the application settings properties. + + + Occurs before the value of an application settings property is changed. + + + + Gets or sets the settings key for the application settings group. + A containing the settings key for the current settings group. + + + Occurs after the application settings are retrieved from storage. + + + + Occurs before values are saved to the data store. + + + + Updates application settings to reflect a more recent installation of the application. + The configuration file could not be parsed. + + + Represents a grouping of related application settings sections within a configuration file. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Provides a method for reading values of a particular type from the configuration. + + + Initializes a new instance of the class. + + + Gets the value for a specified key from the property and returns an object of the specified type containing the value from the configuration. + The key for which to get the value. + The type of the object to return. + The value of the specified key. + key is null. - or - type is null. + key does not exist in the <appSettings> configuration section. - or - The value in the <appSettings> configuration section for key is not of type type. + + + Provides configuration system support for the appSettings configuration section. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a configuration file that provides additional settings or overrides the settings specified in the appSettings element. + A configuration file that provides additional settings or overrides the settings specified in the appSettings element. + + + Gets a collection of key/value pairs that contains application settings. + A collection of key/value pairs that contains the application settings from the configuration file. + + + Provides dynamic validation of an object. + + + Initializes a new instance of the class. + The type of object that will be validated. + The used as the delegate. + type is null. + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches the type used as the first parameter when creating an instance of ; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Specifies a object to use for code validation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets the name of the callback method. + The name of the method to call. + + + Gets or sets the type of the validator. + The of the current validator attribute instance. + + + Gets the validator instance. + The current instance. + The value of the property is null. + The property is not set to a public static void method with one object parameter. + + + Represents a group of user-scoped application settings in a configuration file. + + + Initializes a new instance of the class. + + + Gets the collection of client settings for the section. + A containing all the client settings found in the current configuration section. + + + Represents a collection of string elements separated by commas. This class cannot be inherited. + + + Creates a new instance of the class. + + + Adds a string to the comma-delimited collection. + A string value. + + + Adds all the strings in a string array to the collection. + An array of strings to add to the collection. + + + Clears the collection. + + + Creates a copy of the collection. + A copy of the . + + + Adds a string element to the collection at the specified index. + The index in the collection at which the new element will be added. + The value of the new element to add to the collection. + + + Gets a value that specifies whether the collection has been modified. + true if the has been modified; otherwise, false. + + + Gets a value indicating whether the collection object is read-only. + true if the specified string element in the is read-only; otherwise, false. + + + Gets or sets a string element in the collection based on the index. + The index of the string element in the collection. + A string element in the collection. + + + Removes a string element from the collection. + The string to remove. + + + Sets the collection object to read-only. + + + Returns a string representation of the object. + A string representation of the object. + + + Converts a comma-delimited string value to and from a object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Converts a object to a object. + The used for type conversions. + The used during conversion. + The comma-separated to convert. + A containing the converted value. + + + Converts a object to a object. + The used for type conversions. + The used during conversion. + The value to convert. + The conversion type. + The representing the converted value parameter, which is a . + + + Represents a configuration file that is applicable to a particular computer, application, or resource. This class cannot be inherited. + + + Gets the object configuration section that applies to this object. + An object representing the appSettings configuration section that applies to this object. + + + Specifies a function delegate that is used to transform assembly strings in configuration files. + A delegate that transforms type strings. The default value is null. + + + Gets a configuration-section object that applies to this object. + A configuration-section object representing the connectionStrings configuration section that applies to this object. + + + Gets the object for the object. + The object for the object. + + + Gets the physical path to the configuration file represented by this object. + The physical path to the configuration file represented by this object. + + + Returns the specified object. + + The specified object. + + + Gets the specified object. + + The specified. + + + Gets a value that indicates whether a file exists for the resource represented by this object. + true if there is a configuration file; otherwise, false. + + + Gets the locations defined within this object. + A containing the locations defined within this object. + + + Gets or sets a value indicating whether the configuration file has an XML namespace. + true if the configuration file has an XML namespace; otherwise, false. + + + Gets the root for this object. + The root section group for this object. + + + Writes the configuration settings contained within this object to the current XML configuration file. + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the current XML configuration file. + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the current XML configuration file. + + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + + + filename is null or an empty string (""). + + + Gets a collection of the section groups defined by this configuration. + A collection representing the collection of section groups for this object. + + + Gets a collection of the sections defined by this object. + A collection of the sections defined by this object. + + + Specifies the targeted version of the .NET Framework when a version earlier than the current one is targeted. + The name of the targeted version of the .NET Framework. The default value is null, which indicates that the current version is targeted. + + + Specifies a function delegate that is used to transform type strings in configuration files. + A delegate that transforms type strings. The default value is null. + + + Specifies the locations within the configuration-file hierarchy that can set or override the properties contained within a object. + + + The can be defined anywhere. + + + + The can be defined only in the Machine.config file. + + + + The can be defined in either the Machine.config file, the machine-level Web.config file found in the same directory as Machine.config, or the top-level application Web.config file found in the virtual-directory root, but not in subdirectories of a virtual root. + + + + The can be defined in either the Machine.config file or the machine-level Web.config file found in the same directory as Machine.config, but not in application Web.config files. + + + + Specifies the locations within the configuration-file hierarchy that can set or override the properties contained within a object. + + + The can be defined only in the Machine.config file. + + + + The can be defined either in the Machine.config file or in the Exe.config file in the client application directory. This is the default value. + + + + The can be defined in the Machine.config file, in the Exe.config file in the client application directory, in the User.config file in the roaming user directory, or in the User.config file in the local user directory. + + + + The can be defined in the Machine.config file, in the Exe.config file in the client application directory, or in the User.config file in the roaming user directory. + + + + Declaratively instructs the .NET Framework to create an instance of a configuration element collection. This class cannot be inherited. + + + Initializes a new instance of the class. + The type of the property collection to create. + itemType is null. + + + Gets or sets the name of the <add> configuration element. + The name that substitutes the standard name "add" for the configuration item. + + + Gets or sets the name for the <clear> configuration element. + The name that replaces the standard name "clear" for the configuration item. + + + Gets or sets the type of the attribute. + The type of the . + + + Gets the type of the collection element. + The type of the collection element. + + + Gets or sets the name for the <remove> configuration element. + The name that replaces the standard name "remove" for the configuration element. + + + The base class for the configuration converter types. + + + Initializes a new instance of the class. + + + Determines whether the conversion is allowed. + The object used for type conversions. + The to convert from. + true if the conversion is allowed; otherwise, false. + + + Determines whether the conversion is allowed. + The object used for type conversion. + The type to convert to. + true if the conversion is allowed; otherwise, false. + + + Represents a configuration element within a configuration file. + + + Initializes a new instance of the class. + + + Gets a reference to the top-level instance that represents the configuration hierarchy that the current instance belongs to. + The top-level instance that the current instance belongs to. + + + Reads XML from the configuration file. + The that reads from the configuration file. + true to serialize only the collection key properties; otherwise, false. + The element to read is locked. - or - An attribute of the current node is not recognized. - or - The lock status of the current node cannot be determined. + + + Gets an object that contains the non-customizable information and functionality of the object. + An that contains the non-customizable information and functionality of the . + + + Gets the object that represents the object itself. + The that represents the itself. + + + Compares the current instance to the specified object. + The object to compare with. + true if the object to compare with is equal to the current instance; otherwise, false. The default is false. + + + Gets the object for the object. + The for the . + The current element is not associated with a context. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Returns the transformed version of the specified assembly name. + The name of the assembly. + The transformed version of the assembly name. If no transformer is available, the assemblyName parameter value is returned unchanged. The property is null if no transformer is available. + + + Returns the transformed version of the specified type name. + The name of the type. + The transformed version of the specified type name. If no transformer is available, the typeName parameter value is returned unchanged. The property is null if no transformer is available. + + + Gets a value that indicates whether the property is null. + false if the property is null; otherwise, true. + + + Sets the object to its initial state. + + + Used to initialize a default set of values for the object. + + + Indicates whether this configuration element has been modified since it was last saved or loaded, when implemented in a derived class. + true if the element has been modified; otherwise, false. + + + Gets a value indicating whether the object is read-only. + true if the object is read-only; otherwise, false. + + + Gets or sets a property or attribute of this configuration element. + + The specified property, attribute, or child element. + property is null or does not exist within the element. + property is read only or locked. + + + Gets or sets a property, attribute, or child element of this configuration element. + + The specified property, attribute, or child element + prop is read-only or locked. + + + Adds the invalid-property errors in this object, and in all subelements, to the passed list. + + + + Gets the collection of locked attributes. + The of locked attributes (properties) for the element. + + + Gets the collection of locked elements. + The of locked elements. + + + Gets the collection of locked attributes + The of locked attributes (properties) for the element. + + + Gets the collection of locked elements. + The of locked elements. + + + Gets or sets a value indicating whether the element is locked. + true if the element is locked; otherwise, false. The default is false. + The element has already been locked at a higher configuration level. + + + Gets a value indicating whether an unknown attribute is encountered during deserialization. + The name of the unrecognized attribute. + The value of the unrecognized attribute. + true when an unknown attribute is encountered while deserializing; otherwise, false. + + + Gets a value indicating whether an unknown element is encountered during deserialization. + + The being used for deserialization. + true when an unknown element is encountered while deserializing; otherwise, false. + The element identified by elementName is locked. - or - One or more of the element's attributes is locked. - or - elementName is unrecognized, or the element has an unrecognized attribute. - or - The element has a Boolean attribute with an invalid value. - or - An attempt was made to deserialize a property more than once. - or - An attempt was made to deserialize a property that is not a valid member of the element. - or - The element cannot contain a CDATA or text element. + + + Throws an exception when a required property is not found. + The name of the required attribute that was not found. + None. + In all cases. + + + Called after deserialization. + + + Called before serialization. + The that will be used to serialize the . + + + Gets the collection of properties. + The of properties for the element. + + + Resets the internal state of the object, including the locks and the properties collections. + The parent node of the configuration element. + + + Resets the value of the method to false when implemented in a derived class. + + + Writes the contents of this configuration element to the configuration file when implemented in a derived class. + The that writes to the configuration file. + true to serialize only the collection key properties; otherwise, false. + true if any data was actually serialized; otherwise, false. + The current attribute is locked at a higher configuration level. + + + Writes the outer tags of this configuration element to the configuration file when implemented in a derived class. + The that writes to the configuration file. + The name of the to be written. + true if writing was successful; otherwise, false. + The element has multiple child elements. + + + Sets a property to the specified value. + The element property to set. + The value to assign to the property. + true if the locks on the property should be ignored; otherwise, false. + Occurs if the element is read-only or ignoreLocks is true but the locks cannot be ignored. + + + Sets the property for the object and all subelements. + + + Modifies the object to remove all values that should not be saved. + + + + + + Represents a configuration element containing a collection of child elements. + + + Initializes a new instance of the class. + + + Creates a new instance of the class. + The comparer to use. + comparer is null. + + + Gets or sets the name of the to associate with the add operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Adds a configuration element to the . + The to add. + + + Adds a configuration element to the configuration element collection. + The to add. + true to throw an exception if the specified is already contained in the ; otherwise, false. + The to add already exists in the and the throwIfExists parameter is true. + + + Adds a configuration element to the configuration element collection. + The index location at which to add the specified . + The to add. + + + Removes all configuration element objects from the collection. + The configuration is read-only. - or - A collection item has been locked in a higher-level configuration. + + + Gets the configuration element at the specified index location. + The index location of the to return. + The at the specified index. + index is less than 0. - or - There is no at the specified index. + + + Returns the configuration element with the specified key. + The key of the element to return. + The with the specified key; otherwise, null. + + + Returns an array of the keys for all of the configuration elements contained in the . + An array that contains the keys for all of the objects contained in the . + + + Gets the key for the at the specified index location. + The index location for the . + The key for the specified . + index is less than 0. - or - There is no at the specified index. + + + Indicates the index of the specified . + The for the specified index location. + The index of the specified ; otherwise, -1. + + + Indicates whether the with the specified key has been removed from the . + The key of the element to check. + true if the with the specified key has been removed; otherwise, false. The default is false. + + + Removes a from the collection. + The key of the to remove. + No with the specified key exists in the collection, the element has already been removed, or the element cannot be removed because the value of its is not . + + + Removes the at the specified index location. + The index location of the to remove. + The configuration is read-only. - or - index is less than 0 or greater than the number of objects in the collection. - or - The object has already been removed. - or - The value of the object has been locked at a higher level. - or - The object was inherited. - or - The value of the object's is not or . + + + Gets or sets the name for the to associate with the clear operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Gets the type of the . + The of this collection. + + + Copies the contents of the to an array. + Array to which to copy the contents of the . + Index location at which to begin copying. + + + Gets the number of elements in the collection. + The number of elements in the collection. + + + Creates a new when overridden in a derived class. + The name of the to create. + A new with a specified name. + + + When overridden in a derived class, creates a new . + A newly created . + + + Gets the name used to identify this collection of elements in the configuration file when overridden in a derived class. + The name of the collection; otherwise, an empty string. The default is an empty string. + + + Gets or sets a value that specifies whether the collection has been cleared. + true if the collection has been cleared; otherwise, false. The default is false. + The configuration is read-only. + + + Compares the to the specified object. + The object to compare. + true if the object to compare with is equal to the current instance; otherwise, false. The default is false. + + + Gets the element key for a specified configuration element when overridden in a derived class. + The to return the key for. + An that acts as the key for the specified . + + + Gets an which is used to iterate through the . + An which is used to iterate through the . + + + Gets a unique value representing the instance. + A unique value representing the current instance. + + + Indicates whether the specified exists in the . + The name of the element to verify. + true if the element exists in the collection; otherwise, false. The default is false. + + + Indicates whether the specified can be removed from the . + The element to check. + true if the specified can be removed from this ; otherwise, false. The default is true. + + + Indicates whether this has been modified since it was last saved or loaded when overridden in a derived class. + true if any contained element has been modified; otherwise, false + + + Indicates whether the object is read only. + true if the object is read only; otherwise, false. + + + Gets a value indicating whether access to the collection is synchronized. + true if access to the is synchronized; otherwise, false. + + + Causes the configuration system to throw an exception. + The name of the unrecognized element. + An input stream that reads XML from the configuration file. + true if the unrecognized element was deserialized successfully; otherwise, false. The default is false. + The element specified in elementName is the <clear> element. + elementName starts with the reserved prefix "config" or "lock". + + + Gets or sets the name of the to associate with the remove operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Resets the to its unmodified state when overridden in a derived class. + The representing the collection parent element, if any; otherwise, null. + + + Resets the value of the property to false when overridden in a derived class. + + + Writes the configuration data to an XML element in the configuration file when overridden in a derived class. + Output stream that writes XML to the configuration file. + true to serialize the collection key; otherwise, false. + true if the was written to the configuration file successfully. + One of the elements in the collection was added or replaced and starts with the reserved prefix "config" or "lock". + + + Sets the property for the object and for all sub-elements. + + + Gets an object used to synchronize access to the . + An object used to synchronize access to the . + + + Gets a value indicating whether an attempt to add a duplicate to the will cause an exception to be thrown. + true if an attempt to add a duplicate to this will cause an exception to be thrown; otherwise, false. + + + Reverses the effect of merging configuration information from different levels of the configuration hierarchy + A object at the current level containing a merged view of the properties. + The parent object of the current element, or null if this is the top level. + + + + Copies the to an array. + Array to which to copy this . + Index location at which to begin copying. + + + Specifies the type of a object. + + + The default type of . Collections of this type contain elements that can be merged across a hierarchy of configuration files. At any particular level within such a hierarchy, add, remove, and clear directives are used to modify any inherited properties and specify new ones. + + + + Same as , except that this type causes the object to sort its contents such that inherited elements are listed last. + + + + Collections of this type contain elements that apply to the level at which they are specified, and to all child levels. A child level cannot modify the properties specified by a parent element of this type. + + + + Same as , except that this type causes the object to sort its contents such that inherited elements are listed last. + + +
+
\ No newline at end of file diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.dll b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.dll new file mode 100644 index 0000000..e0ab375 Binary files /dev/null and b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.dll differ diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.xml b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.xml new file mode 100644 index 0000000..fdf8ae3 --- /dev/null +++ b/packages/System.Configuration.ConfigurationManager.4.4.1/ref/netstandard2.0/System.Configuration.ConfigurationManager.xml @@ -0,0 +1,4888 @@ + + + + System.Configuration.ConfigurationManager + + + + Provides a object that uses the Windows data protection API (DPAPI) to encrypt and decrypt configuration data. + + + Initializes a new instance of the class using default settings. + + + Decrypts the passed object. + + A decrypted object. + encrypted_node does not have set to "EncryptedData" and set to . - or - encrypted_node does not have a child node named "CipherData" with a child node named "CipherValue". - or - The child node named "CipherData" is an empty node. + + + Encrypts the passed object. + The object to encrypt. + An encrypted object. + + + Initializes the provider with default settings. + The provider name to use for the object. + A collection of values to use when initializing the object. + configurationValues contains an unrecognized configuration setting. + + + Gets a value that indicates whether the object is using machine-specific or user-account-specific protection. + true if the is using machine-specific protection; false if it is using user-account-specific protection. + + + Contains meta-information about an individual element within the configuration. This class cannot be inherited. + + + Gets the errors for the associated element and subelements + The collection containing the errors for the associated element and subelements + + + Gets a value indicating whether the associated object is a collection. + true if the associated object is a collection; otherwise, false. + + + Gets a value that indicates whether the associated object cannot be modified. + true if the associated object cannot be modified; otherwise, false. + + + Gets a value indicating whether the associated object is in the configuration file. + true if the associated object is in the configuration file; otherwise, false. + + + Gets the line number in the configuration file where the associated object is defined. + The line number in the configuration file where the associated object is defined. + + + Gets a collection of the properties in the associated object. + A collection of the properties in the associated object. + + + Gets the source file where the associated object originated. + The source file where the associated object originated. + + + Gets the type of the associated object. + The type of the associated object. + + + Gets the object used to validate the associated object. + The object used to validate the associated object. + + + Defines the configuration file mapping for an .exe application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified machine configuration file name. + The name of the machine configuration file that includes the complete physical path (for example, c:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\machine.config). + + + Creates a copy of the existing object. + An object. + + + Gets or sets the name of the configuration file. + The configuration file name. + + + Gets or sets the name of the configuration file for the local user. + The configuration file name. + + + Gets or sets the name of the configuration file for the roaming user. + The configuration file name. + + + Manages the path context for the current application. This class cannot be inherited. + + + Gets the current path for the application. + A string value containing the current path. + + + Gets an object representing the path level of the current application. + A object representing the path level of the current application. + + + Converts between a string and an enumeration type. + + + Initializes a new instance of the class. + The enumeration type to convert. + typeEnum is null. + + + Converts a to an type. + The object used for type conversions. + The object used during conversion. + The object to convert. + The type that represents the data parameter. + data is null or an empty string (""). - or - data starts with a numeric character. - or - data includes white space. + + + Converts an type to a value. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter. + + + Defines extended capabilities for client-based application settings providers. + + + Returns the value of the specified settings property for the previous version of the same application. + A describing the current application usage. + The whose value is to be returned. + A containing the value of the specified property setting as it was last set in the previous version of the application; or null if the setting cannot be found. + + + Resets the application settings associated with the specified application to their default values. + A describing the current application usage. + + + Indicates to the provider that the application has been upgraded. This offers the provider an opportunity to upgrade its stored settings as appropriate. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + + + Handles the access to certain configuration sections. + + + Creates a configuration section handler. + Parent object. + Configuration context object. + Section XML node. + The created section handler object. + + + Provides standard configuration methods. + + + Gets the specified configuration. + The configuration key. + The object representing the configuration. + + + Used for initialization. + + + Provides the configuration setting for International Domain Name (IDN) processing in the class. + + + Initializes a new instance of the class. + + + Gets or sets the value of the configuration setting. + A that contains the current configuration setting for IDN processing. + + + Provides a wrapper type definition for configuration sections that are not handled by the types. + + + Initializes a new instance of the class. + + + Provides a legacy section-handler definition for configuration sections that are not handled by the types. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds the specified configuration object to the section-handler collection. + The configuration settings in a corresponding parent configuration section. + The virtual path for which the configuration section handler computes configuration values. Normally this parameter is reserved and is null. + An that contains the configuration information to be handled. Provides direct access to the XML contents of the configuration section. + The created configuration handler object. + + + Converts between a string and the standard infinite or integer value. + + + Initializes a new instance of the class. + + + Converts a to an . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter integer value. + + + Converts an .to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The "infinite" if the value is ; otherwise, the representing the value parameter. + + + Converts between a string and the standard infinite value. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the infinite; otherwise, the representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The used during object conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in minutes. + + + Provides validation of an value. + + + Initializes a new instance of the class. + An object that specifies the minimum value. + An object that specifies the maximum value. + + + Initializes a new instance of the class. + An object that specifies the minimum value. + An object that specifies the maximum value. + true to specify that the validation range is exclusive. Inclusive means the value to be validated must be within the specified range; exclusive means that it must be below the minimum or above the maximum. + + + Initializes a new instance of the class. + An object that specifies the minimum length of the integer value. + An object that specifies the maximum length of the integer value. + A value that specifies whether the validation range is exclusive. + An object that specifies a value that must be matched. + resolution is less than 0. - or - minValue is greater than maxValue. + + + Determines whether the type of the object can be validated. + The type of the object. + true if the type parameter matches an value; otherwise, false. + + + Determines whether the value of an object is valid. + The value to be validated. + + + Declaratively instructs the .NET Framework to perform integer validation on a configuration property. This class cannot be inherited. + + + Creates a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range defined by the and property values. + true if the value must be excluded; otherwise, false. The default is false. + + + Gets or sets the maximum value allowed for the property. + An integer that indicates the allowed maximum value. + The selected value is less than . + + + Gets or sets the minimum value allowed for the property. + An integer that indicates the allowed minimum value. + The selected value is greater than . + + + Gets an instance of the class. + The validator instance. + + + Delegates all members of the interface to another instance of a host. + + + Initializes a new instance of the class. + + + Creates a new configuration context. + A string representing the path to a configuration file. + A string representing a location subpath. + A representing a new configuration context. + + + Creates a deprecated configuration context. + A string representing the path to a configuration file. + A representing a deprecated configuration context. + + + Decrypts an encrypted configuration section. + An encrypted section of a configuration file. + A object. + + A string representing a decrypted configuration section. + + + Deletes the object performing I/O tasks on a configuration file. + The name of a object performing I/O tasks on a configuration file. + + + Encrypts a section of a configuration object. + + A object. + + A string representing an encrypted section of the configuration object. + + + Returns a configuration path based on a location subpath. + A string representing the path to a configuration file. + + A string representing a configuration path. + + + Returns a representing the type of the configuration. + A string representing the configuration type. + true if an exception should be thrown if an error is encountered; false if an exception should not be thrown if an error is encountered. + A representing the type of the configuration. + + + Returns a string representing the type name of the configuration object. + A object. + A string representing the type name of the configuration object. + + + Returns the name of a object performing I/O tasks on a configuration file. + A string representing the path to a configuration file. + A string representing the name of a object performing I/O tasks on a configuration file. + + + Returns the name of a object performing I/O tasks on a configuration source. + The name of a object performing I/O tasks on a configuration file. + A string representing the configuration source. + A string representing the name of a object performing I/O tasks on a configuration source. + + + Returns a object representing the version of a object performing I/O tasks on a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object representing the version of a object performing I/O tasks on a configuration file. + + + Gets or sets the object. + A object. + + + Instructs the host to impersonate and returns an object required internally by the .NET Framework. + An value. + + + Initializes the configuration host. + + A parameter object containing the values used for initializing the configuration host. + + + Initializes the host for configuration. + A string representing a location subpath (passed by reference). + A string representing the path to a configuration file. + The location configuration path. + + A parameter object representing the parameters used to initialize the host. + + + Returns a value indicating whether the configuration is above the application configuration in the configuration hierarchy. + A string representing the path to a configuration file. + true if the configuration is above the application configuration in the configuration hierarchy; otherwise, false. + + + Returns a value indicating whether a configuration record is required for the host configuration initialization. + A string representing the path to a configuration file. + true if a configuration record is required for the host configuration initialization; otherwise, false. + + + Restricts or allows definitions in the host configuration. + A string representing the path to a configuration file. + The object. + The object. + true if the grant or restriction of definitions in the host configuration was successful; otherwise, false. + + + Returns a value indicating whether the file path used by a object to read a configuration file is a valid path. + The name of a object performing I/O tasks on a configuration file. + true if the path used by a object to read a configuration file is a valid path; otherwise, false. + + + Returns a value indicating whether a configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands. + The object. + true if the configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands; otherwise, false. + + + Returns a value indicating whether the initialization of a configuration object is considered delayed. + The object. + true if the initialization of a configuration object is considered delayed; otherwise, false. + + + Returns a value indicating whether the configuration object supports a location tag. + A string representing the path to a configuration file. + true if the configuration object supports a location tag; otherwise, false. + + + Gets a value indicating whether the configuration is remote. + true if the configuration is remote; otherwise, false. + + + Returns a value indicating whether a configuration path is to a configuration node whose contents should be treated as a root. + A string representing the path to a configuration file. + true if the configuration path is to a configuration node whose contents should be treated as a root; otherwise, false. + + + Returns a value indicating whether the configuration path is trusted. + A string representing the path to a configuration file. + true if the configuration path is trusted; otherwise, false. + + + Opens a object to read a configuration file. + The name of a object performing I/O tasks on a configuration file. + Returns the object specified by streamName. + + + Opens a object to read a configuration file. + The name of a object performing I/O tasks on a configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Opens a object for writing to a configuration file or for writing to a temporary file used to build a configuration file. Allows a object to be designated as a template for copying file attributes. + The name of a object performing I/O tasks on a configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object (passed by reference). + A object. + + + Opens a object for writing to a configuration file. Allows a object to be designated as a template for copying file attributes. + The name of a object performing I/O tasks on a configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object performing I/O tasks on the configuration file (passed by reference). + true to assert permissions; otherwise, false. + Returns the object specified by the streamName parameter. + + + Returns a value indicating whether the entire configuration file could be read by a designated object. + A string representing the path to a configuration file. + The name of a object performing I/O tasks on a configuration file. + true if the entire configuration file could be read by the object designated by streamName; otherwise, false. + + + Instructs the object to read a designated section of its associated configuration file. + A string representing the name of a section group in the configuration file. + A string representing the name of a section in the configuration file. + true if a section of the configuration file designated by the sectionGroupName and sectionName parameters can be read by a object; otherwise, false. + + + Indicates that a new configuration record requires a complete initialization. + An object. + + + Instructs the host to monitor an associated object for changes in a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object to receive the returned data representing the changes in the configuration file. + An instance containing changed configuration settings. + + + Instructs the host object to stop monitoring an associated object for changes in a configuration file. + The name of a object performing I/O tasks on a configuration file. + A object. + + + Gets a value indicating whether the host configuration supports change notifications. + true if the host supports change notifications; otherwise, false. + + + Gets a value indicating whether the host configuration supports location tags. + true if the host supports location tags; otherwise, false. + + + Gets a value indicating whether the host configuration has path support. + true if the host configuration has path support; otherwise, false. + + + Gets a value indicating whether the host configuration supports refresh. + true if the host configuration supports refresh; otherwise, false. + + + Verifies that a configuration definition is allowed for a configuration record. + A string representing the path to a configuration file. + An object. + A object + An object. + + + Indicates that all writing to the configuration file has completed. + The name of a object performing I/O tasks on a configuration file. + true if writing to the configuration file completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + + + Indicates that all writing to the configuration file has completed and specifies whether permissions should be asserted. + The name of a object performing I/O tasks on a configuration file. + true to indicate that writing was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + + + Defines an interface used by the .NET Framework to support creating error configuration records. + + + Gets a string specifying the file name related to the configuration details. + A string specifying a filename. + + + Gets an integer specifying the line number related to the configuration details. + An integer specifying a line number. + + + Defines an interface used by the .NET Framework to support the initialization of configuration properties. + + + Gets the configuration host. + An object that is used by the .NET Framework to initialize application configuration properties. + + + Initializes a configuration object. + The type of configuration host. + An array of configuration host parameters. + + + Gets the root of the configuration hierarchy. + An object. + + + Defines an interface used by the .NET Framework to support configuration management. + + + Ensures that the networking configuration is loaded. + + + Provides the possible values for the configuration setting of the in the namespace. + + + This value will convert any Unicode domain names to their Punycode equivalents (IDN names). + + + + This value will convert all external Unicode domain names to use the Punycode equivalents (IDN names). In this case to handle international names on the local Intranet, the DNS servers that are used for the Intranet should support Unicode names. + + + + This value will not convert any Unicode domain names to use Punycode. This is the default value which is consistent with the .NET Framework 2.0 behavior. + + + + Is the base class to create providers for encrypting and decrypting protected-configuration data. + + + Initializes a new instance of the class using default settings. + + + Decrypts the passed object from a configuration file. + + The object containing decrypted data. + + + Encrypts the passed object from a configuration file. + The object to encrypt. + The object containing encrypted data. + + + Provides a collection of objects. + + + Initializes a new instance of the class using default settings. + + + Adds a object to the collection. + A object to add to the collection. + provider is null. + provider is not a object. + The object to add already exists in the collection. - or - The collection is read-only. + + + Gets a object in the collection with the specified name. + The name of a object in the collection. + The object with the specified name, or null if there is no object with that name. + + + Provides programmatic access to the configProtectedData configuration section. This class cannot be inherited. + + + Initializes a new instance of the class using default settings. + + + Gets or sets the name of the default object in the collection property. + The name of the default object in the collection property. + + + Gets a collection of all the objects in all participating configuration files. + A collection of all the objects in all participating configuration files. + + + Represents a group of configuration elements that configure the providers for the <configProtectedData> configuration section. + + + Initializes a new instance of the class. + + + Gets a collection that represents the properties of the providers for the protected configuration data. + A that represents the properties of the providers for the protected configuration data. + + + Gets a collection of objects that represent the properties of the providers for the protected configuration data. + A collection of objects that represent the properties of the providers for the protected configuration data. + + + Provides a base implementation for the extensible provider model. + + + Initializes a new instance of the class. + + + Gets a brief, friendly description suitable for display in administrative tools or other user interfaces (UIs). + A brief, friendly description suitable for display in administrative tools or other UIs. + + + Initializes the configuration builder. + The friendly name of the provider. + A collection of the name/value pairs representing the provider-specific attributes specified in the configuration for this provider. + The name of the provider is null. + The name of the provider has a length of zero. + An attempt is made to call on a provider after the provider has already been initialized. + + + Gets the friendly name used to refer to the provider during configuration. + The friendly name used to refer to the provider during configuration. + + + Represents a collection of provider objects that inherit from . + + + Initializes a new instance of the class. + + + Adds a provider to the collection. + The provider to be added. + The collection is read-only. + provider is null. + The of provider is null. - or - The length of the of provider is less than 1. + + + Removes all items from the collection. + The collection is set to read-only. + + + Copies the contents of the collection to the given array starting at the specified index. + The array to copy the elements of the collection to. + The index of the collection item at which to start the copying process. + + + Gets the number of providers in the collection. + The number of providers in the collection. + + + Returns an object that implements the interface to iterate through the collection. + An object that implements to iterate through the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + false in all cases. + + + Gets the provider with the specified name. + The key by which the provider is identified. + The provider with the specified name. + + + Removes a provider from the collection. + The name of the provider to be removed. + The collection has been set to read-only. + + + Sets the collection to be read-only. + + + Gets the current object. + The current object. + + + Copies the elements of the to an array, starting at a particular array index. + The array to copy the elements of the collection to. + The index of the array at which to start copying provider instances from the collection. + + + The exception that is thrown when a configuration provider error has occurred. This exception class is also used by providers to throw exceptions when internal errors occur within the provider that do not map to other pre-existing exception classes. + + + Creates a new instance of the class. + + + Creates a new instance of the class. + A message describing why this was thrown. + + + Creates a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + + + Creates a new instance of the class. + A message describing why this was thrown. + The exception that caused this to be thrown. + + + Represents the configuration elements associated with a provider. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + The name of the provider to configure settings for. + The type of the provider to configure settings for. + + + Gets or sets the name of the provider configured by this class. + The name of the provider. + + + Gets a collection of user-defined parameters for the provider. + A of parameters for the provider. + + + Gets or sets the type of the provider configured by this class. + The fully qualified namespace and class name for the type of provider configured by this instance. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + The object to add. + + + Clears the collection. + + + Gets or sets a value at the specified index in the collection. + + The specified . + + + Gets an item from the collection. + A string reference to the object within the collection. + A object contained in the collection. + + + Removes an element from the collection. + + + + Provides validation of a string based on the rules provided by a regular expression. + + + Initializes a new instance of the class. + A string that specifies a regular expression. + regex is null or an empty string (""). + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches a string; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + value does not conform to the parameters of the class. + + + Declaratively instructs the .NET Framework to perform string validation on a configuration property using a regular expression. This class cannot be inherited. + + + Initializes a new instance of the object. + The string to use for regular expression validation. + + + Gets the string used to perform regular-expression validation. + The string containing the regular expression used to filter the string assigned to the decorated configuration-element property. + + + Gets an instance of the class. + The validator instance. + + + Provides a instance that uses RSA encryption to encrypt and decrypt configuration data. + + + Initializes a new instance of the class. + + + Adds a key to the RSA key container. + The size of the key to add. + true to indicate that the key is exportable; otherwise, false. + + + Gets the name of the Windows cryptography API (crypto API) cryptographic service provider (CSP). + The name of the CryptoAPI cryptographic service provider. + + + Decrypts the XML node passed to it. + + The decrypted XML node. + + + Removes a key from the RSA key container. + + + Encrypts the XML node passed to it. + The to encrypt. + An encrypted object. + + + Exports an RSA key from the key container. + The file name and path to export the key to. + true to indicate that private parameters are exported; otherwise, false. + path is a zero-length string, contains only white space, or contains one or more invalid characters as defined by . + path is null. + The specified path, file name, or both exceed the system-defined maximum length. For example, on Windows-based platforms, paths must be less than 248 characters, and file names must be less than 260 characters. + The specified path is invalid, such as being on an unmapped drive. + An error occurred while opening the file. + path specified a file that is read-only. -or- This operation is not supported on the current platform. -or- path specified a directory. -or- The caller does not have the required permission. + The file specified in path was not found. + path is in an invalid format. + The caller does not have the required permission. + + + Imports an RSA key into the key container. + The file name and path to import the key from. + true to indicate that the key is exportable; otherwise, false. + path is a zero-length string, contains only white space, or contains one or more invalid characters as defined by . + path is null. + The specified path, file name, or both exceed the system-defined maximum length. For example, on Windows-based platforms, paths must be less than 248 characters, and file names must be less than 260 characters. + The specified path is invalid, such as being on an unmapped drive. + An error occurred while opening the file. + path specified a file that is write-only. -or- This operation is not supported on the current platform. -or- path specified a directory. -or- The caller does not have the required permission. + The file specified in path was not found. + path is in an invalid format. + + + Initializes the provider with default settings. + The provider name to use for the object. + A collection of values to use when initializing the object. + configurationValues includes one or more unrecognized values. + + + Gets the name of the key container. + The name of the key container. + + + Gets the public key used by the provider. + An object that contains the public key used by the provider. + + + Gets a value indicating whether the provider uses FIPS. + true if the provider uses FIPS; otherwise, false. + + + Gets a value that indicates whether the object is using the machine key container. + true if the object is using the machine key container; otherwise, false. + + + Gets a value that indicates whether the provider is using Optimal Asymmetric Encryption Padding (OAEP) key exchange data. + true if the object is using Optimal Asymmetric Encryption Padding (OAEP) key exchange data; otherwise, false. + + + Represents an element in a class. + + + Initializes a new instance of the class. + + + Gets the value of the GenericUriParserOptions entry from a instance. + The value of GenericUriParserOptions entry. + + + Gets the value of the Name entry from a instance. + The protocol used by this schema setting. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Gets the default collection type of . + The default collection type of . + + + The index of the specified . + The for the specified index location. + The index of the specified ; otherwise, -1. + + + Gets an item at the specified index in the collection. + The index of the to return. + The specified . + The index parameter is less than zero. -or- The item specified by the parameter is null or has been removed. + + + Gets an item from the collection. + A string reference to the object within the collection. + A object contained in the collection. + + + Contains metadata about an individual section within the configuration hierarchy. This class cannot be inherited. + + + Gets or sets a value that indicates where in the configuration file hierarchy the associated configuration section can be defined. + A value that indicates where in the configuration file hierarchy the associated object can be declared. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates where in the configuration file hierarchy the associated configuration section can be declared. + A value that indicates where in the configuration file hierarchy the associated object can be declared for .exe files. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates whether the configuration section allows the location attribute. + true if the location attribute is allowed; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that indicates whether the associated configuration section can be overridden by lower-level configuration files. + true if the section can be overridden; otherwise, false. The default is false. + + + Gets or sets the name of the include file in which the associated configuration section is defined, if such a file exists. + The name of the include file in which the associated is defined, if such a file exists; otherwise, an empty string (""). + + + Forces the associated configuration section to appear in the configuration file. + + + Forces the associated configuration section to appear in the configuration file, or removes an existing section from the configuration file. + + require is true and the associated section cannot be exported to the child configuration file, or it is undeclared. + + + Gets or sets a value that indicates whether the associated configuration section will be saved even if it has not been modified. +

true if the associated object will be saved even if it has not been modified; otherwise, false. The default is false.

+


If the configuration file is saved (even if there are no modifications), ASP.NET restarts the application.

+

+
+
+ + Gets the configuration section that contains the configuration section associated with this object. + The configuration section that contains the that is associated with this object. + The method is invoked from a parent section. + + + Returns an XML node object that represents the associated configuration-section object. + The XML representation for this configuration section. + This configuration object is locked and cannot be edited. + + + Gets or sets a value that indicates whether the settings that are specified in the associated configuration section are inherited by applications that reside in a subdirectory of the relevant application. + true if the settings specified in this object are inherited by child applications; otherwise, false. The default is true. + + + Gets a value that indicates whether the configuration section must be declared in the configuration file. + true if the associated object must be declared in the configuration file; otherwise, false. + + + Gets a value that indicates whether the associated configuration section is declared in the configuration file. + true if this is declared in the configuration file; otherwise, false. The default is true. + + + Gets a value that indicates whether the associated configuration section is locked. + true if the section is locked; otherwise, false. + + + Gets a value that indicates whether the associated configuration section is protected. + true if this is protected; otherwise, false. The default is false. + + + Gets the name of the associated configuration section. + The complete name of the configuration section. + + + Gets or sets the enumeration value that specifies whether the associated configuration section can be overridden by child configuration files. + One of the enumeration values. + An attempt was made to change both the and properties, which is not supported for compatibility reasons. + + + Gets or sets a value that specifies the default override behavior of a configuration section by child configuration files. + One of the enumeration values. + The override behavior is specified in a parent configuration section. + + + Gets the override behavior of a configuration section that is in turn based on whether child configuration files can lock the configuration section. + One of the enumeration values. + + + Gets the protected configuration provider for the associated configuration section. + The protected configuration provider for this object. + + + Marks a configuration section for protection. + + The property is set to false. - or - The target section is already a protected data section. + + + Gets a value that indicates whether the associated configuration section requires access permissions. + true if the requirePermission attribute is set to true; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Gets or sets a value that specifies whether a change in an external configuration include file requires an application restart. + true if a change in an external configuration include file requires an application restart; otherwise, false. The default is true. + The selected value conflicts with a value that is already defined. + + + Causes the associated configuration section to inherit all its values from the parent section. + This method cannot be called outside editing mode. + + + Gets the name of the associated configuration section. + The name of the associated object. + + + Sets the object to an XML representation of the associated configuration section within the configuration file. + + xml is null. + + + Gets or sets the section class name. + The name of the class that is associated with this section. + The selected value is null or an empty string (""). + The selected value conflicts with a value that is already defined. + + + Removes the protected configuration encryption from the associated configuration section. + + + Represents a custom settings attribute used to associate settings information with a settings property. + + + Initializes a new instance of the class. + + + Provides data for the event. + + + Initializes an instance of the class. + A containing the name of the application setting. + A containing a category description of the setting. Often this parameter is set to the application settings group name. + A containing the application settings key. + An that contains the new value to be assigned to the application settings property. + true to cancel the event; otherwise, false. + + + Gets the new value being assigned to the application settings property. + An that contains the new value to be assigned to the application settings property. + + + Gets the application settings property category. + A containing a category description of the setting. Typically, this parameter is set to the application settings group name. + + + Gets the application settings key associated with the property. + A containing the application settings key. + + + Gets the name of the application setting associated with the application settings property. + A containing the name of the application setting. + + + Represents the method that will handle the event. + The source of the event, typically an application settings wrapper class derived from the class. + A containing the data for the event. + + + Represents a simplified configuration element used for updating elements in the configuration. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on supplied parameters. + The name of the object. + A object. This object is an enumeration used as the serialization scheme to store configuration settings. + + + Compares the current instance to the specified object. + + true if the instance is equal to the specified object; otherwise, false. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Gets or sets the name of the object. + The name of the object. + + + Gets or sets the serialization mechanism used to persist the values of the object. + A object. + + + Gets or sets the value of a object by using a object. + A object containing the value of the object. + + + Contains a collection of objects. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + The object to add to the collection. + + + Removes all objects from the collection. + + + Gets the type of the configuration collection. + The object of the collection. + + + Gets a object from the collection. + A string value representing the object in the collection. + A object. + + + Removes a object from the collection. + A object. + + + Represents a collection of key/value pairs used to describe a configuration object as well as a object. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A collection of key/value pairs that are related to configuration settings. + + + Provides the base class used to support user property settings. + + + Initializes a new instance of the class. + + + Gets the associated settings context. + A associated with the settings instance. + + + Initializes internal properties used by object. + The settings context related to the settings properties. + The settings properties that will be accessible from the instance. + The initialized providers that should be used when loading and saving property values. + + + Gets a value indicating whether access to the object is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets or sets the value of the specified settings property. + A containing the name of the property to access. + If found, the value of the named settings property. + There are no properties associated with the current object, or the specified property could not be found. + An attempt was made to set a read-only property. + The value supplied is of a type incompatible with the settings property, during a set operation. + + + Gets the collection of settings properties. + A collection containing all the objects. + + + Gets a collection of settings property values. + A collection of objects representing the actual data values for the properties managed by the instance. + + + Gets a collection of settings providers. + A containing objects. + + + Stores the current values of the settings properties. + + + Provides a class that is synchronized (thread safe). + The class used to support user property settings. + A class that is synchronized. + + + Provides contextual information that the provider can use when persisting settings. + + + Initializes a new instance of the class. + + + Provides a string that describes an individual configuration property. This class cannot be inherited. + + + Initializes an instance of the class. + The used as descriptive text. + + + Gets the descriptive text for the associated configuration property. + A containing the descriptive text for the associated configuration property. + + + Provides a string that describes an application settings property group. This class cannot be inherited. + + + Initializes a new instance of the class. + A containing the descriptive text for the application settings group. + + + The descriptive text for the application settings properties group. + A containing the descriptive text for the application settings group. + + + Specifies a name for application settings property group. This class cannot be inherited. + + + Initializes a new instance of the class. + A containing the name of the application settings property group. + + + Gets the name of the application settings property group. + A containing the name of the application settings property group. + + + Provides data for the event. + + + Initializes a new instance of the class. + A object from which settings are loaded. + + + Gets the settings provider used to store configuration settings. + A settings provider. + + + Represents the method that will handle the event. + The source of the event, typically the settings class. + A object that contains the event data. + + + Provides values to indicate which services should be made available to application settings. + + + Enables application settings to be stored in roaming user profiles. For more information about roaming user profiles, see Isolated Storage and Roaming. + + + + Specifies special services for application settings properties. This class cannot be inherited. + + + Initializes a new instance of the class. + A value that enumerates the services being requested. + + + Gets the set of special services that have been requested. + A value that results from using the logical OR operator to combine all the enumeration values corresponding to the requested services. + + + Used internally as the class that represents metadata about an individual configuration property. + + + Initializes a new instance of the class, based on the supplied parameter. + Specifies a copy of an existing object. + + + Initializes a new instance of the class. based on the supplied parameter. + Specifies the name of an existing object. + + + Creates a new instance of the class based on the supplied parameters. + The name of the object. + The type of object. + A object to use for persistence. + A value specifying whether the object is read-only. + The default value of the object. + A object. This object is an enumeration used to set the serialization scheme for storing application settings. + A object. + A Boolean value specifying whether an error will be thrown when the property is unsuccessfully deserialized. + A Boolean value specifying whether an error will be thrown when the property is unsuccessfully serialized. + + + Gets a object containing the attributes of the object. + A object. + + + Gets or sets the default value of the object. + An object containing the default value of the object. + + + Gets or sets a value specifying whether a object is read-only. + true if the is read-only; otherwise, false. + + + Gets or sets the name of the . + The name of the . + + + Gets or sets the type for the . + The type for the . + + + Gets or sets the provider for the . + A object. + + + Gets or sets a object for the . + A object. + + + Gets or sets a value specifying whether an error will be thrown when the property is unsuccessfully deserialized. + true if the error will be thrown when the property is unsuccessfully deserialized; otherwise, false. + + + Gets or sets a value specifying whether an error will be thrown when the property is unsuccessfully serialized. + true if the error will be thrown when the property is unsuccessfully serialized; otherwise, false. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + The collection is read-only. + + + Removes all objects from the collection. + The collection is read-only. + + + Creates a copy of the existing collection. + A class. + + + Copies this object to an array. + The array to copy the object to. + The index at which to begin copying. + + + Gets a value that specifies the number of objects in the collection. + The number of objects in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection. + + + Gets a value that indicates whether access to the collection is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets the collection item with the specified name. + The name of the object. + The object with the specified name. + + + Performs additional, custom processing when adding to the contents of the instance. + A object. + + + Performs additional, custom processing after adding to the contents of the instance. + A object. + + + Performs additional, custom processing when clearing the contents of the instance. + + + Performs additional, custom processing after clearing the contents of the instance. + + + Performs additional, custom processing when removing the contents of the instance. + A object. + + + Performs additional, custom processing after removing the contents of the instance. + A object. + + + Removes a object from the collection. + The name of the object. + The collection is read-only. + + + Sets the collection to be read-only. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Provides an exception for read-only objects. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on a supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class based on the supplied parameters. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class based on supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Provides an exception for objects that are not found. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class, based on a supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class, based on supplied parameters. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class, based on supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Contains the value of a settings property that can be loaded and stored by an instance of . + + + Initializes a new instance of the class, based on supplied parameters. + Specifies a object. + + + Gets or sets whether the value of a object has been deserialized. + true if the value of a object has been deserialized; otherwise, false. + + + Gets or sets whether the value of a object has changed. + true if the value of a object has changed; otherwise, false. + + + Gets the name of the property from the associated object. + The name of the object. + + + Gets the object. + The object that describes the object. + + + Gets or sets the value of the object. + The value of the object. When this value is set, the property is set to true and is set to false. When a value is first accessed from the property, and if the value was initially stored into the object as a serialized representation using the property, the property will trigger deserialization of the underlying value. As a side effect, the property will be set to true. If this chain of events occurs in ASP.NET, and if an error occurs during the deserialization process, the error is logged using the health-monitoring feature of ASP.NET. By default, this means that deserialization errors will show up in the Application Event Log when running under ASP.NET. If this process occurs outside of ASP.NET, and if an error occurs during deserialization, the error is suppressed, and the remainder of the logic during deserialization occurs. If there is no serialized value to deserialize when the deserialization is attempted, then object will instead attempt to return a default value if one was configured as defined on the associated instance. In this case, if the property was set to either null, or to the string "[null]", then the object will initialize the property to either null for reference types, or to the default value for the associated value type. On the other hand, if property holds a valid object reference or string value (other than "[null]"), then the property is returned instead. If there is no serialized value to deserialize when the deserialization is attempted, and no default value was specified, then an empty string will be returned for string types. For all other types, a default instance will be returned by calling — for reference types this means an attempt will be made to create an object instance using the default constructor. If this attempt fails, then null is returned. + While attempting to use the default value from the property, an error occurred. Either the attempt to convert property to a valid type failed, or the resulting value was not compatible with the type defined by . + + + Gets or sets the serialized value of the object. + The serialized value of a object. + The serialization options for the property indicated the use of a string type converter, but a type converter was not available. + + + Gets a Boolean value specifying whether the value of the object is the default value as defined by the property value on the associated object. + true if the value of the object is the default value; otherwise, false. + + + Contains a collection of settings property values that map objects to objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + An attempt was made to add an item to the collection, but the collection was marked as read-only. + + + Removes all objects from the collection. + + + Creates a copy of the existing collection. + A class. + + + Copies this collection to an array. + The array to copy the collection to. + The index at which to begin copying. + + + Gets a value that specifies the number of objects in the collection. + The number of objects in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection. + + + Gets a value that indicates whether access to the collection is synchronized (thread safe). + true if access to the collection is synchronized; otherwise, false. + + + Gets an item from the collection. + A object. + The object with the specified name. + + + Removes a object from the collection. + The name of the object. + An attempt was made to remove an item from the collection, but the collection was marked as read-only. + + + Sets the collection to be read-only. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Provides an exception that is thrown when an invalid type is used with a object. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on the supplied parameter. + A string containing an exception message. + + + Initializes a new instance of the class based on the supplied parameters. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination of the serialized stream. + + + Initializes a new instance of the class based on the supplied parameters. + A string containing an exception message. + The exception that is the cause of the current exception. + + + Acts as a base class for deriving custom settings providers in the application settings architecture. + + + Initializes an instance of the class. + + + Gets or sets the name of the currently running application. + A that contains the application's shortened name, which does not contain a full path or extension, for example, SimpleAppSettings. + + + Returns the collection of settings property values for the specified application instance and settings property group. + A describing the current application use. + A containing the settings property group whose values are to be retrieved. + A containing the values for the specified settings property group. + + + Sets the values of the specified group of property settings. + A describing the current application usage. + A representing the group of property settings to set. + + + Specifies the settings provider used to provide storage for the current application settings class or property. This class cannot be inherited. + + + Initializes an instance of the class. + A containing the name of the settings provider. + + + Initializes a new instance of the class. + A containing the settings provider type. + + + Gets the type name of the settings provider. + A containing the name of the settings provider. + + + Represents a collection of application settings providers. + + + Initializes a new instance of the class. + + + Adds a new settings provider to the collection. + A to add to the collection. + The provider parameter is not of type . -or- The property of the provider parameter is null or an empty string. -or- A settings provider with the same already exists in the collection. + The collection is read-only. + The provider parameter is null. + + + Gets the settings provider in the collection that matches the specified name. + A containing the friendly name of the settings provider. + If found, the whose name matches that specified by the name parameter; otherwise, null. + The name parameter is null. + The collection is read-only when setting this value. + + + Represents the method that will handle the event. + The source of the event, typically a data container or data-bound collection. + A that contains the event data. + + + Determines the serialization scheme used to store application settings. + + + The settings property is serialized using binary object serialization. + + + + The settings provider has implicit knowledge of the property or its type and picks an appropriate serialization mechanism. Often used for custom serialization. + + + + The settings property is serialized as plain text. + + + + The settings property is serialized as XML using XML serialization. + + + + Specifies the serialization mechanism that the settings provider should use. This class cannot be inherited. + + + Initializes an instance of the class. + A enumerated value that specifies the serialization scheme. + + + Gets the enumeration value that specifies the serialization scheme. + A enumerated value that specifies the serialization scheme. + + + Contains the XML representing the serialized value of the setting. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Compares the current instance to the specified object. + The object to compare. + true if the instance is equal to the specified object; otherwise, false. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Gets or sets the value of a object by using an object. + An object containing the value of a . + + + Handles configuration sections that are represented by a single XML tag in the .config file. + + + Initializes a new instance of the class. + + + Used internally to create a new instance of this object. + The parent of this object. + The context of this object. + The object in the configuration. + The created object handler. + + + Specifies the special setting category of a application settings property. + + + The configuration property represents a connection string, typically for a data store or network resource. + + + + The configuration property represents a Uniform Resource Locator (URL) to a Web service. + + + + Indicates that an application settings property has a special significance. This class cannot be inherited. + + + Initializes a new instance of the class. + + + + Gets the value describing the special setting category of the application settings property. + A enumeration value defining the category of the application settings property. + + + Provides validation of a string. + + + Initializes a new instance of the class, based on a supplied parameter. + An integer that specifies the minimum length of the string value. + + + Initializes a new instance of the class, based on supplied parameters. + An integer that specifies the minimum length of the string value. + An integer that specifies the maximum length of the string value. + + + Initializes a new instance of the class, based on supplied parameters. + An integer that specifies the minimum length of the string value. + An integer that specifies the maximum length of the string value. + A string that represents invalid characters. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter matches a string; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + value is less than minValue or greater than maxValue as defined in the constructor. - or - value contains invalid characters. + + + Declaratively instructs the .NET Framework to perform string validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets the invalid characters for the property. + The string that contains the set of characters that are not allowed for the property. + + + Gets or sets the maximum length allowed for the string to assign to the property. + An integer that indicates the maximum allowed length for the string to assign to the property. + The selected value is less than . + + + Gets or sets the minimum allowed value for the string to assign to the property. + An integer that indicates the allowed minimum length for the string to assign to the property. + The selected value is greater than . + + + Gets an instance of the class. + A current settings in a validator instance. + + + Validates that an object is a derived class of a specified type. + + + Initializes a new instance of the class. + The base class to validate against. + baseClass is null. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter matches a type that can be validated; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + value is not of a that can be derived from baseClass as defined in the constructor. + + + Declaratively instructs the .NET Framework to perform validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + The base class type. + + + Gets the base type of the object being validated. + The base type of the object being validated. + + + Gets the validator attribute instance. + The current instance. + + + Converts a time span expressed in minutes. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The representing the value parameter in minutes. + + + Converts a expressed in minutes or as a standard infinite time span. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter in minutes. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in minutes. + + + Converts a time span expressed in seconds. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The representing the data parameter in seconds. + data cannot be parsed as an integer value. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter in minutes. + + + Converts a expressed in seconds or as a standard infinite time span. + + + Initializes a new instance of the class. + + + Converts a to a . + The object used for type conversions. + The object used during conversion. + The object to convert. + The , if the data parameter is the "infinite"; otherwise, the representing the data parameter in seconds. + + + Converts a to a. . + The object used for type conversions. + The object used during conversion. + The value to convert. + The conversion type. + The "infinite", if the value parameter is ; otherwise, the representing the value parameter in seconds. + + + Provides validation of a object. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + A value that specifies whether the validation range is exclusive. + + + Initializes a new instance of the class, based on supplied parameters. + A object that specifies the minimum time allowed to pass validation. + A object that specifies the maximum time allowed to pass validation. + A value that specifies whether the validation range is exclusive. + An value that specifies a number of seconds. + resolutionInSeconds is less than 0. - or - minValue is greater than maxValue. + + + Determines whether the type of the object can be validated. + The type of the object. + true if the type parameter matches a value; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Declaratively instructs the .NET Framework to perform time validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range as defined by and . + true if the value must be excluded; otherwise, false. The default is false. + + + Gets the absolute maximum value. + The allowed maximum value. + + + Gets or sets the relative maximum value. + The allowed maximum value. + The selected value represents less than . + + + Gets the absolute minimum value. + The allowed minimum value. + + + Gets or sets the relative minimum value. + The minimum allowed value. + The selected value represents more than . + + + Gets the absolute maximum value allowed. + + + + Gets the absolute minimum value allowed. + + + + Gets an instance of the class. + The validator instance. + + + Converts between type and string values. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Converts a object to a object. + The object used for type conversions. + The object used during conversion. + The object to convert. + The that represents the data parameter. + The value cannot be resolved. + + + Converts a object to a object. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + The that represents the value parameter. + + + Represents the Uri section within a configuration file. + + + Initializes a new instance of the class. + + + Gets an object that contains the configuration setting for International Domain Name (IDN) processing in the class. + The configuration setting for International Domain Name (IDN) processing in the class. + + + Gets an object that contains the configuration setting for International Resource Identifiers (IRI) parsing in the class. + The configuration setting for International Resource Identifiers (IRI) parsing in the class. + + + Gets a object that contains the configuration settings for scheme parsing in the class. + The configuration settings for scheme parsing in the class + + + Specifies that an application settings group or property contains distinct values for each user of an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Represents a grouping of related user settings sections within a configuration file. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Represents a method to be called after the validation of an object. + + + + Converts a string to its canonical format. + + + Initializes a new instance of the class. + + + Converts a to canonical form. + The object used for type conversions. + The object used during conversion. + The object to convert. + An object representing the converted value. + + + Converts a to canonical form. + The object used for type conversions. + The object used during conversion. + The value to convert to. + The type to convert to. + An object representing the converted value. + + + Specifies the property of a configuration element. This class cannot be inherited. + + + Initializes a new instance of the class, based on a supplied parameter. + A object. + validator is null. + + + Gets a object used to validate the object. + A object. + + + The exception that is thrown when a configuration error has occurred. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The path to the configuration file that caused this exception to be thrown. + The line number within the configuration file at which this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The object that caused this exception to be thrown. + + + Initializes a new instance of a class. + A message that describes why this exception was thrown. + The inner exception that caused this exception to be thrown. + The path to the configuration file that caused this exception to be thrown. + The line number within the configuration file at which this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The exception that caused this exception to be thrown. + + + Initializes a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + The current type is not a or a . + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + + + Initializes a new instance of the class. + A message that describes why this exception was thrown. + The object that caused this exception to be thrown. + + + Gets a description of why this configuration exception was thrown. + A description of why this was thrown. + + + Gets a collection of errors that detail the reasons this exception was thrown. + An object that contains errors that identify the reasons this exception was thrown. + + + Gets the path to the configuration file that caused this configuration exception to be thrown. + The path to the configuration file that caused this to be thrown. + + + Gets the path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + The object that caused this exception to be thrown. + The path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + + + Gets the path to the configuration file that the internal was reading when this configuration exception was thrown. + The object that caused this exception to be thrown. + The path of the configuration file the internal object was accessing when the exception occurred. + + + Gets the line number within the configuration file that the internal object represented when this configuration exception was thrown. + The object that caused this exception to be thrown. + The line number within the configuration file that contains the object being parsed when this configuration exception was thrown. + + + Gets the line number within the configuration file that the internal object was processing when this configuration exception was thrown. + The object that caused this exception to be thrown. + The line number within the configuration file that the object was accessing when the exception occurred. + + + Sets the object with the file name and line number at which this configuration exception occurred. + The object that holds the information to be serialized. + The contextual information about the source or destination. + + + Gets the line number within the configuration file at which this configuration exception was thrown. + The line number within the configuration file at which this exception was thrown. + + + Gets an extended description of why this configuration exception was thrown. + An extended description of why this exception was thrown. + + + The exception that is thrown when a configuration system error has occurred. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + + + Initializes a new instance of the class. + The object that holds the information to deserialize. + Contextual information about the source or destination. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The that caused this to be thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + The that caused this to be thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The path to the configuration file that caused this to be thrown. + The line number within the configuration file at which this was thrown. + + + Initializes a new instance of the class. + A message describing why this exception was thrown. + The inner exception that caused this to be thrown, if any. + The path to the configuration file that caused this to be thrown. + The line number within the configuration file at which this was thrown. + + + Gets a description of why this configuration exception was thrown. + A description of why this exception was thrown. + + + Gets the path to the configuration file that caused this configuration exception to be thrown. + The path to the configuration file that caused this exception to be thrown. + + + Sets the object with the file name and line number at which this configuration exception occurred. + The object that holds the information to be serialized. + The contextual information about the source or destination. + + + Gets the path to the configuration file from which the internal object was loaded when this configuration exception was thrown. + The that caused this exception to be thrown. + A string representing the node file name. + + + Gets the line number within the configuration file that the internal object represented when this configuration exception was thrown. + The that caused this exception to be thrown. + An int representing the node line number. + + + Gets the line number within the configuration file at which this configuration exception was thrown. + The line number within the configuration file at which this exception was thrown. + + + Gets an extended description of why this configuration exception was thrown. + An extended description of why this exception was thrown. + + + Defines the configuration file mapping for the machine configuration file. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class based on the supplied parameter. + The name of the machine configuration file. + + + Creates a copy of the existing object. + A object. + + + Gets or sets the name of the machine configuration file name. + The machine configuration file name. + + + Represents a location element within a configuration file. + + + Creates an instance of a Configuration object. + A Configuration object. + + + Gets the relative path to the resource whose configuration settings are represented by this object. + The relative path to the resource whose configuration settings are represented by this . + + + Contains a collection of objects. + + + Gets the object at the specified index. + The index location of the to return. + The at the specified index. + + + Contains a collection of locked configuration objects. This class cannot be inherited. + + + Locks a configuration object by adding it to the collection. + The name of the configuration object. + Occurs when the name does not match an existing configuration object within the collection. + + + Gets a list of configuration objects contained in the collection. + A comma-delimited string that lists the lock configuration objects in the collection. + + + Clears all configuration objects from the collection. + + + Verifies whether a specific configuration object is locked. + The name of the configuration object to verify. + true if the contains the specified configuration object; otherwise, false. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in array at which copying begins. + + + Gets the number of locked configuration objects contained in the collection. + The number of locked configuration objects contained in the collection. + + + Gets an object, which is used to iterate through this collection. + An object. + + + Gets a value specifying whether the collection of locked objects has parent elements. + true if the collection has parent elements; otherwise, false. + + + Gets a value specifying whether the collection has been modified. + true if the collection has been modified; otherwise, false. + + + Verifies whether a specific configuration object is read-only. + The name of the configuration object to verify. + true if the specified configuration object in the collection is read-only; otherwise, false. + The specified configuration object is not in the collection. + + + Gets a value specifying whether the collection is synchronized. + true if the collection is synchronized; otherwise, false. + + + Removes a configuration object from the collection. + The name of the configuration object. + Occurs when the name does not match an existing configuration object within the collection. + + + Locks a set of configuration objects based on the supplied list. + A comma-delimited string. + Occurs when an item in the attributeList parameter is not a valid lockable configuration attribute. + + + Gets an object used to synchronize access to this collection. + An object used to synchronize access to this collection. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the collection. The must have zero-based indexing. + The zero-based index in array at which copying begins. + + + Provides access to configuration files for client applications. This class cannot be inherited. + + + Gets the data for the current application's default configuration. + Returns a object that contains the contents of the object for the current application's default configuration. + Could not retrieve a object with the application settings data. + + + Gets the data for the current application's default configuration. + Returns a object that contains the contents of the object for the current application's default configuration. + Could not retrieve a object. + + + Retrieves a specified configuration section for the current application's default configuration. + The configuration section path and name. + The specified object, or null if the section does not exist. + A configuration file could not be loaded. + + + Opens the configuration file for the current application as a object. + The for which you are opening the configuration. + A object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object. + The path of the executable (exe) file. + A object. + A configuration file could not be loaded. + + + Opens the machine configuration file on the current computer as a object. + A object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object that uses the specified file mapping and user level. + An object that references configuration file to use instead of the application default configuration file. + The object for which you are opening the configuration. + The configuration object. + A configuration file could not be loaded. + + + Opens the specified client configuration file as a object that uses the specified file mapping, user level, and preload option. + An object that references the configuration file to use instead of the default application configuration file. + The object for which you are opening the configuration. + true to preload all section groups and sections; otherwise, false. + The configuration object. + A configuration file could not be loaded. + + + Opens the machine configuration file as a object that uses the specified file mapping. + An object that references configuration file to use instead of the application default configuration file. + A object. + A configuration file could not be loaded. + + + Refreshes the named section so the next time that it is retrieved it will be re-read from disk. + The configuration section name or the configuration path and section name of the section to refresh. + + + Represents an attribute or a child of a configuration element. This class cannot be inherited. + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + + + Initializes a new instance of the class. + The name of the configuration entity. + The type of the configuration entity. + + + + + The description of the configuration entity. + + + Gets the used to convert this into an XML representation for writing to the configuration file. + A used to convert this into an XML representation for writing to the configuration file. + This cannot be converted. + + + Gets the default value for this property. + An that can be cast to the type specified by the property. + + + Gets the description associated with the . + A string value that describes the property. + + + Indicates whether the assembly name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + true if the property requires assembly name transformation; otherwise, false. + + + Gets a value that indicates whether the property is the default collection of an element. + true if the property is the default collection of an element; otherwise, false. + + + Gets a value indicating whether this is the key for the containing object. + true if this object is the key for the containing element; otherwise, false. The default is false. + + + Gets a value indicating whether this is required. + true if the is required; otherwise, false. The default is false. + + + Indicates whether the type name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + true if the property requires type-name transformation; otherwise, false. + + + Indicates whether the configuration property's parent configuration section is queried at serialization time to determine whether the configuration property should be serialized into XML. + true if the parent configuration section should be queried; otherwise, false. + + + Gets the name of this . + The name of the . + + + Gets the type of this object. + A representing the type of this object. + + + Gets the , which is used to validate this object. + The validator, which is used to validate this . + + + Declaratively instructs the .NET Framework to instantiate a configuration property. This class cannot be inherited. + + + Initializes a new instance of class. + Name of the object defined. + + + Gets or sets the default value for the decorated property. + The object representing the default value of the decorated configuration-element property. + + + Gets or sets a value indicating whether this is the default property collection for the decorated configuration property. + true if the property represents the default collection of an element; otherwise, false. The default is false. + + + Gets or sets a value indicating whether this is a key property for the decorated element property. + true if the property is a key property for an element of the collection; otherwise, false. The default is false. + + + Gets or sets a value indicating whether the decorated element property is required. + true if the property is required; otherwise, false. The default is false. + + + Gets the name of the decorated configuration-element property. + The name of the decorated configuration-element property. + + + Gets or sets the for the decorated configuration-element property. + One of the enumeration values associated with the property. + + + Represents a collection of configuration-element properties. + + + Initializes a new instance of the class. + + + Adds a configuration property to the collection. + The to add. + + + Removes all configuration property objects from the collection. + + + Specifies whether the configuration property is contained in this collection. + An identifier for the to verify. + true if the specified is contained in the collection; otherwise, false. + + + Copies this ConfigurationPropertyCollection to an array. + Array to which to copy. + Index at which to begin copying. + + + Gets the number of properties in the collection. + The number of properties in the collection. + + + Gets the object as it applies to the collection. + The object as it applies to the collection + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + true if access to the is synchronized; otherwise, false. + + + Gets the collection item with the specified name. + The to return. + The with the specified name. + + + Removes a configuration property from the collection. + The to remove. + true if the specified was removed; otherwise, false. + + + Gets the object to synchronize access to the collection. + The object to synchronize access to the collection. + + + Copies this collection to an array. + The array to which to copy. + The index location at which to begin copying. + + + Specifies the options to apply to a property. + + + Indicates whether the assembly name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + + + + Indicates that the property is a default collection. + + + + Indicates that the property is a collection key. + + + + Indicates that the property is required. + + + + Indicates whether the type name for the configuration property requires transformation when it is serialized for an earlier version of the .NET Framework. + + + + Indicates whether the configuration property's parent configuration section should be queried at serialization time to determine whether the configuration property should be serialized into XML. + + + + Indicates that no option applies to the property. + + + + Determines which properties are written out to a configuration file. + + + Causes all properties to be written to the configuration file. This is useful mostly for creating information configuration files or moving configuration values from one machine to another. + + + + Causes only properties that differ from inherited values to be written to the configuration file. + + + + Causes only modified properties to be written to the configuration file, even when the value is the same as the inherited value. + + + + Represents a section within a configuration file. + + + Initializes a new instance of the class. + + + Reads XML from the configuration file. + The object, which reads from the configuration file. + reader found no elements in the configuration file. + + + Returns a custom object when overridden in a derived class. + The object representing the section. + + + Indicates whether this configuration element has been modified since it was last saved or loaded when implemented in a derived class. + true if the element has been modified; otherwise, false. + + + Resets the value of the method to false when implemented in a derived class. + + + Gets a object that contains the non-customizable information and functionality of the object. + A that contains the non-customizable information and functionality of the . + + + Creates an XML string containing an unmerged view of the object as a single section to write to a file. + The instance to use as the parent when performing the un-merge. + The name of the section to create. + The instance to use when writing to a string. + An XML string containing an unmerged view of the object. + + + Indicates whether the specified element should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The object that is a candidate for serialization. + The name of the object as it occurs in XML. + The target version of the .NET Framework. + true if the element should be serialized; otherwise, false. + + + Indicates whether the specified property should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The object that is a candidate for serialization. + The name of the object as it occurs in XML. + The target version of the .NET Framework. + The parent element of the property. + true if the property should be serialized; otherwise, false. + + + Indicates whether the current instance should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The target version of the .NET Framework. + true if the current section should be serialized; otherwise, false. + + + Represents a collection of related sections within a configuration file. + + + Adds a object to the object. + The name of the section to be added. + The section to be added. + + + Clears this object. + + + Copies this object to an array. + The array to copy the object to. + The index location at which to begin copying. + array is null. + The length of array is less than the value of plus index. + + + Gets the number of sections in this object. + An integer that represents the number of sections in the collection. + + + Gets the specified object contained in this object. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object contained in this object. + The name of the object to be returned. + The object with the specified name. + name is null or an empty string (""). + + + Gets an enumerator that can iterate through this object. + An that can be used to iterate through this object. + + + Gets the key of the specified object contained in this object. + The index of the object whose key is to be returned. + The key of the object at the specified index. + + + Used by the system during serialization. + The applicable object. + The applicable object. + + + Gets the specified object. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object. + The name of the object to be returned. + The object with the specified name. + + + Gets the keys to all objects contained in this object. + A object that contains the keys of all sections in this collection. + + + Removes the specified object from this object. + The name of the section to be removed. + + + Removes the specified object from this object. + The index of the section to be removed. + + + Represents a group of related sections within a configuration file. + + + Initializes a new instance of the class. + + + Forces the declaration for this object. + + + Forces the declaration for this object. + + The object is the root section group. - or - The object has a location. + + + Gets a value that indicates whether this object declaration is required. + true if this declaration is required; otherwise, false. + + + Gets a value that indicates whether this object is declared. + true if this is declared; otherwise, false. The default is false. + + + Gets the name property of this object. + The name property of this object. + + + Gets the section group name associated with this . + The section group name of this object. + + + Gets a object that contains all the objects that are children of this object. + A object that contains all the objects that are children of this object. + + + Gets a object that contains all of objects within this object. + A object that contains all the objects within this object. + + + Indicates whether the current instance should be serialized when the configuration object hierarchy is serialized for the specified target version of the .NET Framework. + The target version of the .NET Framework. + true if the current section group should be serialized; otherwise, false. + + + Gets or sets the type for this object. + The type of this object. + The object is the root section group. - or - The object has a location. + The section or group is already defined at another level. + + + Represents a collection of objects. + + + Adds a object to this object. + The name of the object to be added. + The object to be added. + + + Clears the collection. + + + Copies this object to an array. + The array to copy the object to. + The index location at which to begin copying. + array is null. + The length of array is less than the value of plus index. + + + Gets the number of section groups in the collection. + An integer that represents the number of section groups in the collection. + + + Gets the specified object contained in the collection. + The index of the object to be returned. + The object at the specified index. + + + Gets the specified object from the collection. + The name of the object to be returned. + The object with the specified name. + name is null or an empty string (""). + + + Gets an enumerator that can iterate through the object. + An that can be used to iterate through the object. + + + Gets the key of the specified object contained in this object. + The index of the section group whose key is to be returned. + The key of the object at the specified index. + + + Used by the system during serialization. + The applicable object. + The applicable object. + + + Gets the object whose index is specified from the collection. + The index of the object to be returned. + The object at the specified index. In C#, this property is the indexer for the class. + + + Gets the object whose name is specified from the collection. + The name of the object to be returned. + The object with the specified name. In C#, this property is the indexer for the class. + + + Gets the keys to all objects contained in this object. + A object that contains the names of all section groups in this collection. + + + Removes the object whose name is specified from this object. + The name of the section group to be removed. + + + Removes the object whose index is specified from this object. + The index of the section group to be removed. + + + Provides runtime versions 1.0 and 1.1 support for reading configuration sections and common configuration settings. + + + Gets a read-only of the application settings section of the configuration file. + A read-only of the application settings section from the configuration file. + + + Returns the object for the passed configuration section name and path. + A configuration name and path, such as "system.net/settings". +

The object for the passed configuration section name and path.

+


The class provides backward compatibility only. You should use the class or class instead.

+

+
+ Unable to retrieve the requested section. +
+ + Used to specify which configuration file is to be represented by the Configuration object. + + + Get the that applies to all users. + + + + Get the roaming that applies to the current user. + + + + Get the local that applies to the current user. + + + + Serves as the base class for the validator attribute types. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified validator type. + The validator type to use when creating an instance of . + validator is null. + validator is not derived from . + + + Gets the validator attribute instance. + The current . + + + Gets the type of the validator attribute. + The of the current validator attribute instance. + + + Acts as a base class for deriving a validation class so that a value of an object can be verified. + + + Initializes an instance of the class. + + + Determines whether an object can be validated based on type. + The object type. + true if the type parameter value matches the expected type; otherwise, false. + + + Determines whether the value of an object is valid. + The object value. + + + Wraps the corresponding type and also carries the necessary information for reporting file-name and line numbers. + + + Initializes a new instance of the class. + + + Creates a configuration element attribute. + The prefix definition. + The name that is used locally. + The URL that is assigned to the namespace. + The attribute. + + + Creates an XML CData section. + The data to use. + The value. + + + Create an XML comment. + + The value. + + + Creates a configuration element. + The prefix definition. + The name used locally. + The namespace for the URL. + The value. + + + Creates white spaces. + The data to use. + The value. + + + Create a text node. + The text to use. + The value. + + + Creates white space. + The data to use. + The value. + + + Gets the configuration file name. + The configuration file name. + + + Gets the current node line number. + The line number for the current node. + + + Loads the configuration file. + The name of the file. + + + Loads a single configuration element. + The name of the file. + The source for the reader. + + + Gets the configuration file name. + The file name. + + + Gets the configuration line number. + The line number. + + + Represents a single, named connection string in the connection strings configuration file section. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class. + The name of the connection string. + The connection string. + + + Initializes a new instance of a object. + The name of the connection string. + The connection string. + The name of the provider to use with the connection string. + + + Gets or sets the connection string. + The string value assigned to the property. + + + Gets or sets the name. + The string value assigned to the property. + + + Gets or sets the provider name property. + Gets or sets the property. + + + Returns a string representation of the object. + A string representation of the object. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object to add to the collection. + + + Removes all the objects from the collection. + + + Returns the collection index of the passed object. + A object in the collection. + The collection index of the specified object. + + + Gets or sets the connection string at the specified index in the collection. + The index of a object in the collection. + The object at the specified index. + + + Gets or sets the object with the specified name in the collection. + + The object with the specified name; otherwise, null. + + + Removes the specified object from the collection. + A object in the collection. + + + Removes the specified object from the collection. + The name of a object in the collection. + + + Removes the object at the specified index in the collection. + The index of a object in the collection. + + + Provides programmatic access to the connection strings configuration-file section. + + + Initializes a new instance of the class. + + + Gets a collection of objects. + A collection of objects. + + + Encapsulates the context information that is associated with a object. This class cannot be inherited. + + + Provides an object containing configuration-section information based on the specified section name. + The name of the configuration section. + An object containing the specified section within the configuration. + + + Gets the context of the environment where the configuration property is being evaluated. + An object specifying the environment where the configuration property is being evaluated. + + + Gets a value specifying whether the configuration property is being evaluated at the machine configuration level. + true if the configuration property is being evaluated at the machine configuration level; otherwise, false. + + + Represents a basic configuration-section handler that exposes the configuration section's XML for both read and write access. + + + Initializes a new instance of the class. + + + Specifies the default value for an application settings property. + + + Initializes an instance of the class. + A that represents the default value for the property. + + + Gets the default value for the application settings property. + A that represents the default value for the property. + + + Provides validation of an object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether an object can be validated, based on type. + The object type. + true for all types being validated. + + + Determines whether the value of an object is valid. + The object value. + + + Provides key/value pair configuration information from a configuration section. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + Parent object. + Configuration context object. + Section XML node. + A configuration object. + + + Gets the XML attribute name to use as the key in a key/value pair. + A string value containing the name of the key attribute. + + + Gets the XML attribute name to use as the value in a key/value pair. + A string value containing the name of the value attribute. + + + Defines an interface used by the .NET Framework to initialize configuration properties. + + + Gets the configuration file name related to the application path. + A string value representing a configuration file name. + + + Gets the local configuration directory of the application based on the entry assembly. + A string representing the local configuration directory. + + + Gets the local configuration path of the application based on the entry assembly. + A string value representing the local configuration path of the application. + + + Gets the product name of the application based on the entry assembly. + A string value representing the product name of the application. + + + Gets the product version of the application based on the entry assembly. + A string value representing the product version of the application. + + + Gets the roaming configuration directory of the application based on the entry assembly. + A string value representing the roaming configuration directory of the application. + + + Gets the roaming user's configuration path based on the application's entry assembly. + A string value representing the roaming user's configuration path. + + + Gets the configuration path for the Machine.config file. + A string value representing the path of the Machine.config file. + + + Gets a value representing the configuration system's status. + true if the configuration system is in the process of being initialized; otherwise, false. + + + Gets a value that specifies whether user configuration settings are supported. + true if the configuration system supports user configuration settings; otherwise, false. + + + Gets the name of the file used to store user configuration settings. + A string specifying the name of the file used to store user configuration. + + + Defines interfaces that allow the internal .NET Framework infrastructure to customize configuration. + + + Returns the path to the application configuration file. + A string representing the path to the application configuration file. + + + Returns a string representing the path to the known local user configuration file. + A string representing the path to the known local user configuration file. + + + Returns a string representing the path to the known roaming user configuration file. + A string representing the path to the known roaming user configuration file. + + + Returns a value indicating whether a configuration file path is the same as a currently known application configuration file path. + A string representing the path to the application configuration file. + true if a string representing a configuration path is the same as a path to the application configuration file; false if a string representing a configuration path is not the same as a path to the application configuration file. + + + Returns a value indicating whether a configuration file path is the same as the configuration file path for the currently known local user. + A string representing the path to the application configuration file. + true if a string representing a configuration path is the same as a path to a known local user configuration file; otherwise, false. + + + Returns a value indicating whether a configuration file path is the same as the configuration file path for the currently known roaming user. + A string representing the path to an application configuration file. + true if a string representing a configuration path is the same as a path to a known roaming user configuration file; otherwise, false. + + + Defines the interfaces used by the internal design time API to create a object. + + + Creates and initializes a object. + The of the object to be created. + A parameter array of that contains the parameters to be applied to the created object. + A object. + + + Normalizes a location subpath of a path to a configuration file. + A string representing the path to the configuration file. + An instance of or null. + A normalized subpath string. + + + Defines interfaces used by internal .NET structures to initialize application configuration properties. + + + Creates and returns a context object for a of an application configuration. + A string representing the path of the application configuration file. + A string representing a subpath location of the configuration element. + A context object for a object of an application configuration. + + + Creates and returns a deprecated context object of the application configuration. + A string representing a path to an application configuration file. + A deprecated context object of the application configuration. + + + Decrypts an encrypted configuration section and returns it as a string. + An encrypted XML string representing a configuration section. + The object. + + A decrypted configuration section as a string. + + + Deletes the object performing I/O tasks on the application configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + + + Encrypts a configuration section and returns it as a string. + + The object. + + An encrypted configuration section represented as a string. + + + Returns the complete path to an application configuration file based on the location subpath. + A string representing the path of the application configuration file. + + A string representing the complete path to an application configuration file. + + + Returns a object representing the type of the configuration object. + The type name + true to throw an exception if an error occurs; otherwise, false + A object representing the type of the configuration object. + + + Returns a string representing a type name from the object representing the type of the configuration. + A object. + A string representing the type name from a object representing the type of the configuration. + + + Returns a string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + A string representing the path of the application configuration file. + A string representing the configuration file name associated with the I/O tasks on the configuration file. + + + Returns a string representing the configuration file name associated with the object performing I/O tasks on a remote configuration file. + A string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + A string representing a path to a remote configuration file. + A string representing the configuration file name associated with the object performing I/O tasks on the configuration file. + + + Returns the version of the object associated with configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + The version of the object associated with configuration file. + + + Instructs the host to impersonate and returns an object required by the internal .NET structure. + An value. + + + Initializes a configuration host. + + The parameter object containing the values used for initializing the configuration host. + + + Initializes a configuration object. + The subpath location of the configuration file. + A string representing the path of the application configuration file. + A string representing the location of a configuration path. + + The parameter object containing the values used for initializing the configuration host. + + + Returns a value indicating whether the configuration file is located at a higher level in the configuration hierarchy than the application configuration. + A string representing the path of the application configuration file. + true the configuration file is located at a higher level in the configuration hierarchy than the application configuration; otherwise, false. + + + Returns a value indicating whether a child record is required for a child configuration path. + A string representing the path of the application configuration file. + true if child record is required for a child configuration path; otherwise, false. + + + Determines if a different definition is allowable for an application configuration object. + A string representing the path of the application configuration file. + A object. + A object. + true if a different definition is allowable for an application configuration object; otherwise, false. + + + Returns a value indicating whether the file path used by a object to read a configuration file is a valid path. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the path used by a object to read a configuration file is a valid path; otherwise, false. + + + Returns a value indicating whether a configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands. + The object. + true if the configuration section requires a fully trusted code access security level and does not allow the attribute to disable implicit link demands; otherwise, false. + + + Returns a value indicating whether the initialization of a configuration object is considered delayed. + The object. + true if the initialization of a configuration object is considered delayed; otherwise, false. + + + Returns a value indicating whether the configuration object supports a location tag. + A string representing the path of the application configuration file. + true if the configuration object supports a location tag; otherwise, false. + + + Returns a value indicating whether the configuration is remote. + true if the configuration is remote; otherwise, false. + + + Returns a value indicating whether a configuration path is to a configuration node whose contents should be treated as a root. + A string representing the path of the application configuration file. + true if the configuration path is to a configuration node whose contents should be treated as a root; otherwise, false. + + + Returns a value indicating whether the configuration path is trusted. + A string representing the path of the application configuration file. + true if the configuration path is trusted; otherwise, false. + + + Opens a to read a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object. + + + Opens a object to read a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Opens a object for writing to a configuration file or for writing to a temporary file used to build a configuration file. Allows a object to be designated as a template for copying file attributes. + A string representing the name of the object performing I/O tasks on the configuration file. + The name of a object from which file attributes are to be copied as a template. + The write context of the object. + A object. + + + Opens a object for writing to a configuration file. Allows a object to be designated as a template for copying file attributes. + A string representing the name of the object performing I/O tasks on the configuration file. + The name of a from which file attributes are to be copied as a template. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + Returns the object specified by streamName. + + + Returns a value indicating whether the entire configuration file could be read by a designated object. + A string representing the path of the application configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the entire configuration file could be read by the object designated by streamName; otherwise, false. + + + Instructs the object to read a designated section of its associated configuration file. + A string representing the identifying name of a configuration file section group. + A string representing the identifying name of a configuration file section. + true if a section of the configuration file designated by sectionGroupName and sectionName could be read by a object; otherwise, false. + + + Indicates a new configuration record requires a complete initialization. + An object. + + + Instructs the object to monitor an associated object for changes in a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object to receive the returned data representing the changes in the configuration file. + An containing changed configuration settings. + + + Instructs the object to stop monitoring an associated object for changes in a configuration file. + A string representing the name of the object performing I/O tasks on the configuration file. + A object. + + + Returns a value indicating whether the host configuration supports change notification. + true if the configuration supports change notification; otherwise, false. + + + Returns a value indicating whether the host configuration supports location tags. + true if the configuration supports location tags; otherwise, false. + + + Returns a value indicating whether the host configuration supports path tags. + true if the configuration supports path tags; otherwise, false. + + + Returns a value indicating whether the host configuration supports configuration refresh. + true if the configuration supports configuration refresh; otherwise, false. + + + Verifies that a configuration definition is allowed for a configuration record. + A string representing the path of the application configuration file. + A object. + A object + An object. + + + Indicates that all writing to the configuration file has completed. + A string representing the name of the object performing I/O tasks on the configuration file. + true if the write to the configuration file was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + + + Indicates that all writing to the configuration file has completed and specifies whether permissions should be asserted. + A string representing the name of the object performing I/O tasks on the configuration file. + true to indicate the write was completed successfully; otherwise, false. + The write context of the object performing I/O tasks on the configuration file. + true to assert permissions; otherwise, false. + + + Defines interfaces used by internal .NET structures to support creation of new configuration records. + + + Gets a string representing a configuration file path. + A string representing a configuration file path. + + + Returns an object representing a section of a configuration from the last-known-good (LKG) configuration. + A string representing a key to a configuration section. + An instance representing the section of the last-known-good configuration specified by configKey. + + + Returns an instance representing a section of a configuration file. + A string representing a key to a configuration section. + An instance representing a section of a configuration file. + + + Returns a value indicating whether an error occurred during initialization of a configuration object. + true if an error occurred during initialization of a configuration object; otherwise, false. + + + Causes a specified section of the configuration object to be reinitialized. + A string representing a key to a configuration section that is to be refreshed. + + + Removes a configuration record. + + + Returns the name of a object performing I/O tasks on the configuration file. + A string representing the name of a object performing I/O tasks on the configuration file. + + + Grants the configuration object the permission to throw an exception if an error occurs during initialization. + + + Defines interfaces used by internal .NET structures to support a configuration root object. + + + Represents the method that handles the event of an object. + + + + Represents the method that handles the event of a object. + + + + Returns an object representing a configuration specified by a configuration path. + A string representing the path to a configuration file. + An object representing a configuration specified by configPath. + + + Returns an representing the data in a section of a configuration file. + A string representing a section of a configuration file. + A string representing the path to a configuration file. + An representing the data in a section of a configuration file. + + + Returns a value representing the file path of the nearest configuration ancestor that has configuration data. + The path of configuration file. + Returns a string representing the file path of the nearest configuration ancestor that has configuration data. + + + Returns an object representing a unique configuration record for given configuration path. + The path of the configuration file. + An object representing a unique configuration record for a given configuration path. + + + Initializes a configuration object. + An object. + true if design time; false if run time. + + + Returns a value indicating whether the configuration is a design-time configuration. + true if the configuration is a design-time configuration; false if the configuration is not a design-time configuration. + + + Finds and removes a configuration record and all its children for a given configuration path. + The path of the configuration file. + + + Defines an interface used by the configuration system to set the class. + + + Indicates that initialization of the configuration system has completed. + + + Provides hierarchical configuration settings and extensions specific to ASP.NET to the configuration system. + An object used by the class. + true if the initialization process of the configuration system is complete; otherwise, false. + + + Defines an interface used by the .NET Framework to initialize application configuration properties. + + + Returns the configuration object based on the specified key. + The configuration key value. + A configuration object. + + + Refreshes the configuration system based on the specified section name. + The name of the configuration section. + + + Gets a value indicating whether the user configuration is supported. + true if the user configuration is supported; otherwise, false. + + + Defines a class that allows the .NET Framework infrastructure to specify event arguments for configuration events. + + + Initializes a new instance of the class. + A configuration path. + + + Gets or sets the configuration path related to the object. + A string value specifying the configuration path. + + + Defines a class used by the .NET Framework infrastructure to support configuration events. + The source object of the event. + A configuration event argument. + + + Represents a method for hosts to call when a monitored stream has changed. + The name of the object performing I/O tasks on the configuration file. + + + Defines standard functionality for controls or libraries that store and retrieve application settings. + + + Reads the control's application settings into their corresponding properties and updates the control's state. + + + Resets the control's application settings properties to their default values. + + + Persists the control's application settings properties. + + + Gets or sets a value indicating whether the control should automatically persist its application settings properties. + true if the control should automatically persist its state; otherwise, false. + + + Gets or sets the value of the application settings key for the current instance of the control. + A containing the settings key for the current instance of the control. + + + Provides the configuration setting for International Resource Identifier (IRI) processing in the class. + + + Initializes a new instance of the class. + + + Gets or sets the value of the configuration setting. + A Boolean that indicates if International Resource Identifier (IRI) processing is enabled. + + + Provides an interface for defining an alternate application settings provider. + + + Returns the settings provider compatible with the specified settings property. + The that requires serialization. + If found, the that can persist the specified settings property; otherwise, null. + + + Contains a collection of objects. + + + Initializes a new instance of the class. + + + Adds a object to the collection based on the supplied parameters. + A . + + + Adds a object to the collection based on the supplied parameters. + A string specifying the key. + A string specifying the value. + + + Gets the keys to all items contained in the collection. + A string array. + + + Clears the collection. + + + When overridden in a derived class, the method creates a new object. + A newly created . + + + Gets the element key for a specified configuration element when overridden in a derived class. + The to which the key should be returned. + An object that acts as the key for the specified . + + + Gets the object based on the supplied parameter. + The key of the contained in the collection. + A configuration element, or null if the key does not exist in the collection. + + + Gets a collection of configuration properties. + A collection of configuration properties. + + + Removes a object from the collection. + A string specifying the key. + + + Gets a value indicating whether an attempt to add a duplicate object to the collection will cause an exception to be thrown. + true if an attempt to add a duplicate to the will cause an exception to be thrown; otherwise, false. + + + Represents a configuration element that contains a key/value pair. + + + Initializes a new instance of the class based on the supplied parameters. + The key of the . + The value of the . + + + Sets the object to its initial state. + + + Gets the key of the object. + The key of the . + + + Gets the collection of properties. + The of properties for the element. + + + Gets or sets the value of the object. + The value of the . + + + Provides persistence for application settings classes. + + + Initializes a new instance of the class. + + + Gets or sets the name of the currently running application. + A string that contains the application's display name. + + + Returns the value of the named settings property for the previous version of the same application. + A that describes where the application settings property is used. + The whose value is to be returned. + A representing the application setting if found; otherwise, null. + + + Returns the collection of setting property values for the specified application instance and settings property group. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + A containing the values for the specified settings property group. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. + + + Initializes the provider. + The friendly name of the provider. + A collection of the name/value pairs representing the provider-specific attributes specified in the configuration for this provider. + + + Resets all application settings properties associated with the specified application to their default values. + A describing the current application usage. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. + + + Sets the values of the specified group of property settings. + A describing the current application usage. + A representing the group of property settings to set. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. -or- There was a general failure saving the settings to the configuration file. + + + Attempts to migrate previous user-scoped settings from a previous version of the same application. + A describing the current application usage. + A containing the settings property group whose values are to be retrieved. + A user-scoped setting was encountered but the current configuration only supports application-scoped settings. -or- The previous version of the configuration file could not be accessed. + + + Provides validation of an value. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + A value that specifies whether the validation range is exclusive. + + + Initializes a new instance of the class. + An value that specifies the minimum length of the long value. + An value that specifies the maximum length of the long value. + A value that specifies whether the validation range is exclusive. + An value that specifies a specific value that must be matched. + resolution is equal to or less than 0. - or - maxValue is less than minValue. + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches an value; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Declaratively instructs the .NET Framework to perform long-integer validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a value that indicates whether to include or exclude the integers in the range defined by the and property values. + true if the value must be excluded; otherwise, false. The default is false. + + + Gets or sets the maximum value allowed for the property. + A long integer that indicates the allowed maximum value. + The selected value is less than . + + + Gets or sets the minimum value allowed for the property. + An integer that indicates the allowed minimum value. + The selected value is greater than . + + + Gets an instance of the class. + The validator instance. + + + Contains a collection of objects. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a object to the collection. + A object. + + + Gets the keys to all items contained in the . + A string array. + + + Clears the . + + + Gets or sets the object based on the supplied parameter. + The name of the contained in the collection. + A object. + + + Removes a object from the collection based on the provided parameter. + A object. + + + Removes a object from the collection based on the provided parameter. + The name of the object. + + + A configuration element that contains a name and value. This class cannot be inherited. + + + Initializes a new instance of the class based on supplied parameters. + The name of the object. + The value of the object. + + + Gets the name of the object. + The name of the object. + + + Gets or sets the value of the object. + The value of the object. + + + Provides access to a configuration file. This type supports the .NET Framework configuration infrastructure and is not intended to be used directly from your code. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + The parent object. + The configuration context object. + The section XML node. + A configuration object. + The file specified in the file attribute of section exists but cannot be loaded. - or - The name attribute of section does not match the root element of the file specified in the file attribute. + + + Provides name/value-pair configuration information from a configuration section. + + + Initializes a new instance of the class. + + + Creates a new configuration handler and adds it to the section-handler collection based on the specified parameters. + Parent object. + Configuration context object. + Section XML node. + A configuration object. + + + Gets the XML attribute name to use as the key in a key/value pair. + A value containing the name of the key attribute. + + + Gets the XML attribute name to use as the value in a key/value pair. + A value containing the name of the value attribute. + + + Specifies that a settings provider should disable any logic that gets invoked when an application upgrade is detected. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Specifies the override behavior of a configuration element for configuration elements in child directories. + + + The configuration setting of the element or group can be overridden by configuration settings that are in child directories. + + + + The configuration setting of the element or group cannot be overridden by configuration settings that are in child directories. + + + + The configuration setting of the element or group will be overridden by configuration settings that are in child directories if explicitly allowed by a parent element of the current configuration element or group. Permission to override is specified by using the OverrideMode attribute. + + + + Provides validation of a object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the object type can be validated. + The object type. + true if the type parameter matches a object; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + value is null. + value cannot be resolved as a positive value. + + + Declaratively instructs the .NET Framework to perform time validation on a configuration property. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets an instance of the class. + The validator instance. + + + Contains meta-information on an individual property within the configuration. This type cannot be inherited. + + + Gets the object related to the configuration attribute. + A object. + + + Gets an object containing the default value related to a configuration attribute. + An object containing the default value of the configuration attribute. + + + Gets the description of the object that corresponds to a configuration attribute. + The description of the configuration attribute. + + + Gets a value specifying whether the configuration attribute is a key. + true if the configuration attribute is a key; otherwise, false. + + + Gets a value specifying whether the configuration attribute is locked. + true if the object is locked; otherwise, false. + + + Gets a value specifying whether the configuration attribute has been modified. + true if the object has been modified; otherwise, false. + + + Gets a value specifying whether the configuration attribute is required. + true if the object is required; otherwise, false. + + + Gets the line number in the configuration file related to the configuration attribute. + A line number of the configuration file. + + + Gets the name of the object that corresponds to a configuration attribute. + The name of the object. + + + Gets the source file that corresponds to a configuration attribute. + The source file of the object. + + + Gets the of the object that corresponds to a configuration attribute. + The of the object. + + + Gets a object related to the configuration attribute. + A object. + + + Gets or sets an object containing the value related to a configuration attribute. + An object containing the value for the object. + + + Gets a object related to the configuration attribute. + A object. + + + Contains a collection of objects. This class cannot be inherited. + + + Copies the entire collection to a compatible one-dimensional , starting at the specified index of the target array. + A one-dimensional that is the destination of the elements copied from the collection. The must have zero-based indexing. + The zero-based index in array at which copying begins. + array is null. + The property of array is less than + index. + + + Gets an object, which is used to iterate through this collection. + An object, which is used to iterate through this . + + + Populates a object with the data needed to serialize the instance. + A object that contains the information required to serialize the instance. + A object that contains the source and destination of the serialized stream associated with the instance. + info is null. + + + Gets the object in the collection, based on the specified property name. + The name of the configuration attribute contained in the object. + A object. + + + Specifies the level in the configuration hierarchy where a configuration property value originated. + + + The configuration property value originates from the property. + + + + The configuration property value is inherited from a parent level in the configuration. + + + + The configuration property value is defined at the current level of the hierarchy. + + + + Provides access to the protected-configuration providers for the current application's configuration file. + + + The name of the data protection provider. + + + + Gets the name of the default protected-configuration provider. + The name of the default protected-configuration provider. + + + The name of the protected data section. + + + + Gets a collection of the installed protected-configuration providers. + A collection of installed objects. + + + The name of the RSA provider. + + + + Specifies that an application settings property has a common value for all users of an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Acts as a base class for deriving concrete wrapper classes to implement the application settings feature in Window Forms applications. + + + Initializes an instance of the class to its default state. + + + Initializes an instance of the class using the supplied owner component. + The component that will act as the owner of the application settings object. + owner is null. + + + Initializes an instance of the class using the supplied settings key. + A that uniquely identifies separate instances of the wrapper class. + + + Initializes an instance of the class using the supplied owner component and settings key. + The component that will act as the owner of the application settings object. + A that uniquely identifies separate instances of the wrapper class. + owner is null. + + + Gets the application settings context associated with the settings group. + A associated with the settings group. + + + Returns the value of the named settings property for the previous version of the same application. + A containing the name of the settings property whose value is to be returned. + An containing the value of the specified if found; otherwise, null. + The property does not exist. The property count is zero or the property cannot be found in the data store. + + + Gets or sets the value of the specified application settings property. + A containing the name of the property to access. + If found, the value of the named settings property; otherwise, null. + There are no properties associated with the current wrapper or the specified property could not be found. + An attempt was made to set a read-only property. + The value supplied is of a type incompatible with the settings property, during a set operation. + The configuration file could not be parsed. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Raises the event. + The source of the event. + A that contains the event data. + + + Gets the collection of settings properties in the wrapper. + A containing all the objects used in the current wrapper. + The associated settings provider could not be found or its instantiation failed. + + + Occurs after the value of an application settings property is changed. + + + + Gets a collection of property values. + A of property values. + + + Gets the collection of application settings providers used by the wrapper. + A containing all the objects used by the settings properties of the current settings wrapper. + + + Refreshes the application settings property values from persistent storage. + + + Restores the persisted application settings values to their corresponding default properties. + The configuration file could not be parsed. + + + Stores the current values of the application settings properties. + + + Occurs before the value of an application settings property is changed. + + + + Gets or sets the settings key for the application settings group. + A containing the settings key for the current settings group. + + + Occurs after the application settings are retrieved from storage. + + + + Occurs before values are saved to the data store. + + + + Updates application settings to reflect a more recent installation of the application. + The configuration file could not be parsed. + + + Represents a grouping of related application settings sections within a configuration file. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Provides a method for reading values of a particular type from the configuration. + + + Initializes a new instance of the class. + + + Gets the value for a specified key from the property and returns an object of the specified type containing the value from the configuration. + The key for which to get the value. + The type of the object to return. + The value of the specified key. + key is null. - or - type is null. + key does not exist in the <appSettings> configuration section. - or - The value in the <appSettings> configuration section for key is not of type type. + + + Provides configuration system support for the appSettings configuration section. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets a configuration file that provides additional settings or overrides the settings specified in the appSettings element. + A configuration file that provides additional settings or overrides the settings specified in the appSettings element. + + + Gets a collection of key/value pairs that contains application settings. + A collection of key/value pairs that contains the application settings from the configuration file. + + + Provides dynamic validation of an object. + + + Initializes a new instance of the class. + The type of object that will be validated. + The used as the delegate. + type is null. + + + Determines whether the type of the object can be validated. + The type of object. + true if the type parameter matches the type used as the first parameter when creating an instance of ; otherwise, false. + + + Determines whether the value of an object is valid. + The value of an object. + + + Specifies a object to use for code validation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Gets or sets the name of the callback method. + The name of the method to call. + + + Gets or sets the type of the validator. + The of the current validator attribute instance. + + + Gets the validator instance. + The current instance. + The value of the property is null. + The property is not set to a public static void method with one object parameter. + + + Represents a group of user-scoped application settings in a configuration file. + + + Initializes a new instance of the class. + + + Gets the collection of client settings for the section. + A containing all the client settings found in the current configuration section. + + + Represents a collection of string elements separated by commas. This class cannot be inherited. + + + Creates a new instance of the class. + + + Adds a string to the comma-delimited collection. + A string value. + + + Adds all the strings in a string array to the collection. + An array of strings to add to the collection. + + + Clears the collection. + + + Creates a copy of the collection. + A copy of the . + + + Adds a string element to the collection at the specified index. + The index in the collection at which the new element will be added. + The value of the new element to add to the collection. + + + Gets a value that specifies whether the collection has been modified. + true if the has been modified; otherwise, false. + + + Gets a value indicating whether the collection object is read-only. + true if the specified string element in the is read-only; otherwise, false. + + + Gets or sets a string element in the collection based on the index. + The index of the string element in the collection. + A string element in the collection. + + + Removes a string element from the collection. + The string to remove. + + + Sets the collection object to read-only. + + + Returns a string representation of the object. + A string representation of the object. + + + Converts a comma-delimited string value to and from a object. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Converts a object to a object. + The used for type conversions. + The used during conversion. + The comma-separated to convert. + A containing the converted value. + + + Converts a object to a object. + The used for type conversions. + The used during conversion. + The value to convert. + The conversion type. + The representing the converted value parameter, which is a . + + + Represents a configuration file that is applicable to a particular computer, application, or resource. This class cannot be inherited. + + + Gets the object configuration section that applies to this object. + An object representing the appSettings configuration section that applies to this object. + + + Specifies a function delegate that is used to transform assembly strings in configuration files. + A delegate that transforms type strings. The default value is null. + + + Gets a configuration-section object that applies to this object. + A configuration-section object representing the connectionStrings configuration section that applies to this object. + + + Gets the object for the object. + The object for the object. + + + Gets the physical path to the configuration file represented by this object. + The physical path to the configuration file represented by this object. + + + Returns the specified object. + + The specified object. + + + Gets the specified object. + + The specified. + + + Gets a value that indicates whether a file exists for the resource represented by this object. + true if there is a configuration file; otherwise, false. + + + Gets the locations defined within this object. + A containing the locations defined within this object. + + + Gets or sets a value indicating whether the configuration file has an XML namespace. + true if the configuration file has an XML namespace; otherwise, false. + + + Gets the root for this object. + The root section group for this object. + + + Writes the configuration settings contained within this object to the current XML configuration file. + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the current XML configuration file. + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the current XML configuration file. + + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + + The configuration file could not be written to. - or - The configuration file has changed. + + + Writes the configuration settings contained within this object to the specified XML configuration file. + The path and file name to save the configuration file to. + + + filename is null or an empty string (""). + + + Gets a collection of the section groups defined by this configuration. + A collection representing the collection of section groups for this object. + + + Gets a collection of the sections defined by this object. + A collection of the sections defined by this object. + + + Specifies the targeted version of the .NET Framework when a version earlier than the current one is targeted. + The name of the targeted version of the .NET Framework. The default value is null, which indicates that the current version is targeted. + + + Specifies a function delegate that is used to transform type strings in configuration files. + A delegate that transforms type strings. The default value is null. + + + Specifies the locations within the configuration-file hierarchy that can set or override the properties contained within a object. + + + The can be defined anywhere. + + + + The can be defined only in the Machine.config file. + + + + The can be defined in either the Machine.config file, the machine-level Web.config file found in the same directory as Machine.config, or the top-level application Web.config file found in the virtual-directory root, but not in subdirectories of a virtual root. + + + + The can be defined in either the Machine.config file or the machine-level Web.config file found in the same directory as Machine.config, but not in application Web.config files. + + + + Specifies the locations within the configuration-file hierarchy that can set or override the properties contained within a object. + + + The can be defined only in the Machine.config file. + + + + The can be defined either in the Machine.config file or in the Exe.config file in the client application directory. This is the default value. + + + + The can be defined in the Machine.config file, in the Exe.config file in the client application directory, in the User.config file in the roaming user directory, or in the User.config file in the local user directory. + + + + The can be defined in the Machine.config file, in the Exe.config file in the client application directory, or in the User.config file in the roaming user directory. + + + + Declaratively instructs the .NET Framework to create an instance of a configuration element collection. This class cannot be inherited. + + + Initializes a new instance of the class. + The type of the property collection to create. + itemType is null. + + + Gets or sets the name of the <add> configuration element. + The name that substitutes the standard name "add" for the configuration item. + + + Gets or sets the name for the <clear> configuration element. + The name that replaces the standard name "clear" for the configuration item. + + + Gets or sets the type of the attribute. + The type of the . + + + Gets the type of the collection element. + The type of the collection element. + + + Gets or sets the name for the <remove> configuration element. + The name that replaces the standard name "remove" for the configuration element. + + + The base class for the configuration converter types. + + + Initializes a new instance of the class. + + + Determines whether the conversion is allowed. + The object used for type conversions. + The to convert from. + true if the conversion is allowed; otherwise, false. + + + Determines whether the conversion is allowed. + The object used for type conversion. + The type to convert to. + true if the conversion is allowed; otherwise, false. + + + Represents a configuration element within a configuration file. + + + Initializes a new instance of the class. + + + Gets a reference to the top-level instance that represents the configuration hierarchy that the current instance belongs to. + The top-level instance that the current instance belongs to. + + + Reads XML from the configuration file. + The that reads from the configuration file. + true to serialize only the collection key properties; otherwise, false. + The element to read is locked. - or - An attribute of the current node is not recognized. - or - The lock status of the current node cannot be determined. + + + Gets an object that contains the non-customizable information and functionality of the object. + An that contains the non-customizable information and functionality of the . + + + Gets the object that represents the object itself. + The that represents the itself. + + + Compares the current instance to the specified object. + The object to compare with. + true if the object to compare with is equal to the current instance; otherwise, false. The default is false. + + + Gets the object for the object. + The for the . + The current element is not associated with a context. + + + Gets a unique value representing the current instance. + A unique value representing the current instance. + + + Returns the transformed version of the specified assembly name. + The name of the assembly. + The transformed version of the assembly name. If no transformer is available, the assemblyName parameter value is returned unchanged. The property is null if no transformer is available. + + + Returns the transformed version of the specified type name. + The name of the type. + The transformed version of the specified type name. If no transformer is available, the typeName parameter value is returned unchanged. The property is null if no transformer is available. + + + Gets a value that indicates whether the property is null. + false if the property is null; otherwise, true. + + + Sets the object to its initial state. + + + Used to initialize a default set of values for the object. + + + Indicates whether this configuration element has been modified since it was last saved or loaded, when implemented in a derived class. + true if the element has been modified; otherwise, false. + + + Gets a value indicating whether the object is read-only. + true if the object is read-only; otherwise, false. + + + Gets or sets a property or attribute of this configuration element. + + The specified property, attribute, or child element. + property is null or does not exist within the element. + property is read only or locked. + + + Gets or sets a property, attribute, or child element of this configuration element. + + The specified property, attribute, or child element + prop is read-only or locked. + + + Adds the invalid-property errors in this object, and in all subelements, to the passed list. + + + + Gets the collection of locked attributes. + The of locked attributes (properties) for the element. + + + Gets the collection of locked elements. + The of locked elements. + + + Gets the collection of locked attributes + The of locked attributes (properties) for the element. + + + Gets the collection of locked elements. + The of locked elements. + + + Gets or sets a value indicating whether the element is locked. + true if the element is locked; otherwise, false. The default is false. + The element has already been locked at a higher configuration level. + + + Gets a value indicating whether an unknown attribute is encountered during deserialization. + The name of the unrecognized attribute. + The value of the unrecognized attribute. + true when an unknown attribute is encountered while deserializing; otherwise, false. + + + Gets a value indicating whether an unknown element is encountered during deserialization. + + The being used for deserialization. + true when an unknown element is encountered while deserializing; otherwise, false. + The element identified by elementName is locked. - or - One or more of the element's attributes is locked. - or - elementName is unrecognized, or the element has an unrecognized attribute. - or - The element has a Boolean attribute with an invalid value. - or - An attempt was made to deserialize a property more than once. - or - An attempt was made to deserialize a property that is not a valid member of the element. - or - The element cannot contain a CDATA or text element. + + + Throws an exception when a required property is not found. + The name of the required attribute that was not found. + None. + In all cases. + + + Called after deserialization. + + + Called before serialization. + The that will be used to serialize the . + + + Gets the collection of properties. + The of properties for the element. + + + Resets the internal state of the object, including the locks and the properties collections. + The parent node of the configuration element. + + + Resets the value of the method to false when implemented in a derived class. + + + Writes the contents of this configuration element to the configuration file when implemented in a derived class. + The that writes to the configuration file. + true to serialize only the collection key properties; otherwise, false. + true if any data was actually serialized; otherwise, false. + The current attribute is locked at a higher configuration level. + + + Writes the outer tags of this configuration element to the configuration file when implemented in a derived class. + The that writes to the configuration file. + The name of the to be written. + true if writing was successful; otherwise, false. + The element has multiple child elements. + + + Sets a property to the specified value. + The element property to set. + The value to assign to the property. + true if the locks on the property should be ignored; otherwise, false. + Occurs if the element is read-only or ignoreLocks is true but the locks cannot be ignored. + + + Sets the property for the object and all subelements. + + + Modifies the object to remove all values that should not be saved. + + + + + + Represents a configuration element containing a collection of child elements. + + + Initializes a new instance of the class. + + + Creates a new instance of the class. + The comparer to use. + comparer is null. + + + Gets or sets the name of the to associate with the add operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Adds a configuration element to the . + The to add. + + + Adds a configuration element to the configuration element collection. + The to add. + true to throw an exception if the specified is already contained in the ; otherwise, false. + The to add already exists in the and the throwIfExists parameter is true. + + + Adds a configuration element to the configuration element collection. + The index location at which to add the specified . + The to add. + + + Removes all configuration element objects from the collection. + The configuration is read-only. - or - A collection item has been locked in a higher-level configuration. + + + Gets the configuration element at the specified index location. + The index location of the to return. + The at the specified index. + index is less than 0. - or - There is no at the specified index. + + + Returns the configuration element with the specified key. + The key of the element to return. + The with the specified key; otherwise, null. + + + Returns an array of the keys for all of the configuration elements contained in the . + An array that contains the keys for all of the objects contained in the . + + + Gets the key for the at the specified index location. + The index location for the . + The key for the specified . + index is less than 0. - or - There is no at the specified index. + + + Indicates the index of the specified . + The for the specified index location. + The index of the specified ; otherwise, -1. + + + Indicates whether the with the specified key has been removed from the . + The key of the element to check. + true if the with the specified key has been removed; otherwise, false. The default is false. + + + Removes a from the collection. + The key of the to remove. + No with the specified key exists in the collection, the element has already been removed, or the element cannot be removed because the value of its is not . + + + Removes the at the specified index location. + The index location of the to remove. + The configuration is read-only. - or - index is less than 0 or greater than the number of objects in the collection. - or - The object has already been removed. - or - The value of the object has been locked at a higher level. - or - The object was inherited. - or - The value of the object's is not or . + + + Gets or sets the name for the to associate with the clear operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Gets the type of the . + The of this collection. + + + Copies the contents of the to an array. + Array to which to copy the contents of the . + Index location at which to begin copying. + + + Gets the number of elements in the collection. + The number of elements in the collection. + + + Creates a new when overridden in a derived class. + The name of the to create. + A new with a specified name. + + + When overridden in a derived class, creates a new . + A newly created . + + + Gets the name used to identify this collection of elements in the configuration file when overridden in a derived class. + The name of the collection; otherwise, an empty string. The default is an empty string. + + + Gets or sets a value that specifies whether the collection has been cleared. + true if the collection has been cleared; otherwise, false. The default is false. + The configuration is read-only. + + + Compares the to the specified object. + The object to compare. + true if the object to compare with is equal to the current instance; otherwise, false. The default is false. + + + Gets the element key for a specified configuration element when overridden in a derived class. + The to return the key for. + An that acts as the key for the specified . + + + Gets an which is used to iterate through the . + An which is used to iterate through the . + + + Gets a unique value representing the instance. + A unique value representing the current instance. + + + Indicates whether the specified exists in the . + The name of the element to verify. + true if the element exists in the collection; otherwise, false. The default is false. + + + Indicates whether the specified can be removed from the . + The element to check. + true if the specified can be removed from this ; otherwise, false. The default is true. + + + Indicates whether this has been modified since it was last saved or loaded when overridden in a derived class. + true if any contained element has been modified; otherwise, false + + + Indicates whether the object is read only. + true if the object is read only; otherwise, false. + + + Gets a value indicating whether access to the collection is synchronized. + true if access to the is synchronized; otherwise, false. + + + Causes the configuration system to throw an exception. + The name of the unrecognized element. + An input stream that reads XML from the configuration file. + true if the unrecognized element was deserialized successfully; otherwise, false. The default is false. + The element specified in elementName is the <clear> element. + elementName starts with the reserved prefix "config" or "lock". + + + Gets or sets the name of the to associate with the remove operation in the when overridden in a derived class. + The name of the element. + The selected value starts with the reserved prefix "config" or "lock". + + + Resets the to its unmodified state when overridden in a derived class. + The representing the collection parent element, if any; otherwise, null. + + + Resets the value of the property to false when overridden in a derived class. + + + Writes the configuration data to an XML element in the configuration file when overridden in a derived class. + Output stream that writes XML to the configuration file. + true to serialize the collection key; otherwise, false. + true if the was written to the configuration file successfully. + One of the elements in the collection was added or replaced and starts with the reserved prefix "config" or "lock". + + + Sets the property for the object and for all sub-elements. + + + Gets an object used to synchronize access to the . + An object used to synchronize access to the . + + + Gets a value indicating whether an attempt to add a duplicate to the will cause an exception to be thrown. + true if an attempt to add a duplicate to this will cause an exception to be thrown; otherwise, false. + + + Reverses the effect of merging configuration information from different levels of the configuration hierarchy + A object at the current level containing a merged view of the properties. + The parent object of the current element, or null if this is the top level. + + + + Copies the to an array. + Array to which to copy this . + Index location at which to begin copying. + + + Specifies the type of a object. + + + The default type of . Collections of this type contain elements that can be merged across a hierarchy of configuration files. At any particular level within such a hierarchy, add, remove, and clear directives are used to modify any inherited properties and specify new ones. + + + + Same as , except that this type causes the object to sort its contents such that inherited elements are listed last. + + + + Collections of this type contain elements that apply to the level at which they are specified, and to all child levels. A child level cannot modify the properties specified by a parent element of this type. + + + + Same as , except that this type causes the object to sort its contents such that inherited elements are listed last. + + +
+
\ No newline at end of file diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/useSharedDesignerContext.txt b/packages/System.Configuration.ConfigurationManager.4.4.1/useSharedDesignerContext.txt new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Configuration.ConfigurationManager.4.4.1/version.txt b/packages/System.Configuration.ConfigurationManager.4.4.1/version.txt new file mode 100644 index 0000000..b8b4cab --- /dev/null +++ b/packages/System.Configuration.ConfigurationManager.4.4.1/version.txt @@ -0,0 +1 @@ +0f6d0a02c9cc2e766dd543ff24135f16e9a971e4 diff --git a/packages/System.Security.AccessControl.4.7.0/.signature.p7s b/packages/System.Security.AccessControl.4.7.0/.signature.p7s new file mode 100644 index 0000000..fcf666b Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/.signature.p7s differ diff --git a/packages/System.Security.AccessControl.4.7.0/LICENSE.TXT b/packages/System.Security.AccessControl.4.7.0/LICENSE.TXT new file mode 100644 index 0000000..984713a --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/LICENSE.TXT @@ -0,0 +1,23 @@ +The MIT License (MIT) + +Copyright (c) .NET Foundation and Contributors + +All rights reserved. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/packages/System.Security.AccessControl.4.7.0/System.Security.AccessControl.4.7.0.nupkg b/packages/System.Security.AccessControl.4.7.0/System.Security.AccessControl.4.7.0.nupkg new file mode 100644 index 0000000..7055e0a Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/System.Security.AccessControl.4.7.0.nupkg differ diff --git a/packages/System.Security.AccessControl.4.7.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Security.AccessControl.4.7.0/THIRD-PARTY-NOTICES.TXT new file mode 100644 index 0000000..77a243e --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/THIRD-PARTY-NOTICES.TXT @@ -0,0 +1,375 @@ +.NET Core uses third-party libraries or other resources that may be +distributed under licenses different than the .NET Core software. + +In the event that we accidentally failed to list a required notice, please +bring it to our attention. Post an issue or email us: + + dotnet@microsoft.com + +The attached notices are provided for information only. + +License notice for ASP.NET +------------------------------- + +Copyright (c) .NET Foundation. All rights reserved. +Licensed under the Apache License, Version 2.0. + +Available at +https://github.com/aspnet/AspNetCore/blob/master/LICENSE.txt + +License notice for Slicing-by-8 +------------------------------- + +http://sourceforge.net/projects/slicing-by-8/ + +Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + + +This software program is licensed subject to the BSD License, available at +http://www.opensource.org/licenses/bsd-license.html. + + +License notice for Unicode data +------------------------------- + +http://www.unicode.org/copyright.html#License + +Copyright © 1991-2017 Unicode, Inc. All rights reserved. +Distributed under the Terms of Use in http://www.unicode.org/copyright.html. + +Permission is hereby granted, free of charge, to any person obtaining +a copy of the Unicode data files and any associated documentation +(the "Data Files") or Unicode software and any associated documentation +(the "Software") to deal in the Data Files or Software +without restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, and/or sell copies of +the Data Files or Software, and to permit persons to whom the Data Files +or Software are furnished to do so, provided that either +(a) this copyright and permission notice appear with all copies +of the Data Files or Software, or +(b) this copyright and permission notice appear in associated +Documentation. + +THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF +ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT OF THIRD PARTY RIGHTS. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS +NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL +DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, +DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER +TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THE DATA FILES OR SOFTWARE. + +Except as contained in this notice, the name of a copyright holder +shall not be used in advertising or otherwise to promote the sale, +use or other dealings in these Data Files or Software without prior +written authorization of the copyright holder. + +License notice for Zlib +----------------------- + +https://github.com/madler/zlib +http://zlib.net/zlib_license.html + +/* zlib.h -- interface of the 'zlib' general purpose compression library + version 1.2.11, January 15th, 2017 + + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler + + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + +*/ + +License notice for Mono +------------------------------- + +http://www.mono-project.com/docs/about-mono/ + +Copyright (c) .NET Foundation Contributors + +MIT License + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the Software), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for International Organization for Standardization +----------------------------------------------------------------- + +Portions (C) International Organization for Standardization 1986: + Permission to copy in any form is granted for use with + conforming SGML systems and applications as defined in + ISO 8879, provided this notice is included in all copies. + +License notice for Intel +------------------------ + +"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this +list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, +this list of conditions and the following disclaimer in the documentation +and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License notice for Xamarin and Novell +------------------------------------- + +Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Copyright (c) 2011 Novell, Inc (http://www.novell.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Third party notice for W3C +-------------------------- + +"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE +Status: This license takes effect 13 May, 2015. +This work is being provided by the copyright holders under the following license. +License +By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. +Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: +The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. +Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. +Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." +Disclaimers +THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. +COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. +The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." + +License notice for Bit Twiddling Hacks +-------------------------------------- + +Bit Twiddling Hacks + +By Sean Eron Anderson +seander@cs.stanford.edu + +Individually, the code snippets here are in the public domain (unless otherwise +noted) — feel free to use them however you please. The aggregate collection and +descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are +distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and +without even the implied warranty of merchantability or fitness for a particular +purpose. + +License notice for Brotli +-------------------------------------- + +Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +compress_fragment.c: +Copyright (c) 2011, Google Inc. +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +decode_fuzzer.c: +Copyright (c) 2015 The Chromium Authors. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." + +License notice for Json.NET +------------------------------- + +https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md + +The MIT License (MIT) + +Copyright (c) 2007 James Newton-King + +Permission is hereby granted, free of charge, to any person obtaining a copy of +this software and associated documentation files (the "Software"), to deal in +the Software without restriction, including without limitation the rights to +use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of +the Software, and to permit persons to whom the Software is furnished to do so, +subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS +FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR +COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for vectorized base64 encoding / decoding +-------------------------------------------------------- + +Copyright (c) 2005-2007, Nick Galbreath +Copyright (c) 2013-2017, Alfred Klomp +Copyright (c) 2015-2017, Wojciech Mula +Copyright (c) 2016-2017, Matthieu Darbois +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + +- Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + +- Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED +TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/packages/System.Security.AccessControl.4.7.0/lib/net46/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/lib/net46/System.Security.AccessControl.dll new file mode 100644 index 0000000..ea65f02 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/lib/net46/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.dll new file mode 100644 index 0000000..752972c Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/lib/net461/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/lib/netstandard1.3/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/lib/netstandard1.3/System.Security.AccessControl.dll new file mode 100644 index 0000000..dcd15e1 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/lib/netstandard1.3/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.dll new file mode 100644 index 0000000..36fb33a Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/lib/netstandard2.0/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/lib/uap10.0.16299/_._ b/packages/System.Security.AccessControl.4.7.0/lib/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.AccessControl.4.7.0/ref/net46/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/ref/net46/System.Security.AccessControl.dll new file mode 100644 index 0000000..ea65f02 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/ref/net46/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.dll new file mode 100644 index 0000000..c6e18d1 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/net461/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.dll new file mode 100644 index 0000000..f29e71e Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.xml new file mode 100644 index 0000000..689917f --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/System.Security.AccessControl.xml @@ -0,0 +1,1943 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule’1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule’1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule’1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule’1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + true if the enumerator was successfully advanced to the next element; false if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical OR of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager–specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user’s identity and an access mask. + + + + Initializes a new instance of the AuditRule’1 class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the fule is audited. + + + Initializes a new instance of the AuditRule’1 class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the AuditRule’1 class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the AuditRule’1 class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + The rights of the audit rule. + Returns . + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + true if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + + Gets the object at the specified index of the collection. + The object at the specified index. + The zero-based index of the object to get. + + + + + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + true to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + The allowed length of an opaque data BLOB. + true to specify that the object is a callback ACE type. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + true if the ACEs in the current object are in canonical order; otherwise, false. + + + Sets whether the object is a container. + true if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + true if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The at the specified index. + The zero-based index of the to get or set. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + true if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + The collection of access rules associated with the specified object. + true to include access rules explicitly set for the object. + true to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + + + + + + Gets a collection of the audit rules associated with the specified security identifier. + The collection of audit rules associated with the specified object. + true to include audit rules explicitly set for the object. + true to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + + + + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + true if the DACL is successfully modified; otherwise, false. + The modification to apply to the DACL. + The access rule to modify. + true if the DACL is successfully modified; otherwise, false. + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + true if the SACL is successfully modified; otherwise, false. + The modification to apply to the SACL. + The audit rule to modify. + true if the SACL is successfully modified; otherwise, false. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + true if the access rule was successfully removed; otherwise, false. + The access rule to remove. + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + true if the audit rule was successfully removed; otherwise, false. + The audit rule to remove. + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + true if the new security descriptor is associated with a container object. + true if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + true if the new security descriptor is associated with a container object. + true if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + true if the new security descriptor is associated with a container object. + true if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + true if the new security descriptor is associated with a container object. + true if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + true if the object associated with this object is a container object; otherwise, false. + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + true if the DACL associated with this object is in canonical order; otherwise, false. + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + true if the object associated with this object is a directory object; otherwise, false. + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + true if the SACL associated with this object is in canonical order; otherwise, false. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + true to protect the DACL from inheritance. + true to keep inherited access rules in the DACL; false to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + true to protect the SACL from inheritance. + true to keep inherited audit rules in the SACL; false to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not null. Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not null. Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be null. The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify null to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + true if this method successfully removes the specified access; otherwise, false. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + true if this method successfully removes the specified access; otherwise, false. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + + Removes the specified access control rule from the current object. + Returns . + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The object this method creates. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + + + Determines whether the specified object is equal to the current object. + true if the specified object is equal to the current object; otherwise, false. + The object to compare to the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + true if this ACE is inherited; otherwise, false. + + + Determines whether the specified objects are considered equal. + true if the two objects are equal; otherwise, false. + The first object to compare. + The second to compare. + + + Determines whether the specified objects are considered unequal. + true if the two objects are unequal; otherwise, false. + The first object to compare. + The second to compare. + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns a new instance of the class. + The that this method returns. + + + This property is always set to false. It is implemented only because it is required for the implementation of the interface. + Always false. + + + Gets or sets the at the specified index. + The at the specified index. + The zero-based index of the to get or set. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns null. It is implemented only because it is required for the implementation of the interface. + Always returns null. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + The SDDL representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + true if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, false. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + true if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + true if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + true if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + true if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + true if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + true if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The this delegate creates. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + true if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + true if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The object that this method creates. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + true if the access rules associated with this object have been modified; otherwise, false. + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + true if the access rules are in canonical order; otherwise, false. + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + true if the DACL is protected; otherwise, false. + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + true if the audit rules are in canonical order; otherwise, false. + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + true if the SACL is protected; otherwise, false. + + + Initializes a new instance of the class with the specified values. + The object that this method creates. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + true if the audit rules associated with this object have been modified; otherwise, false. + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The primary group associated with the specified owner. + The owner for which to get the primary group. + + + + + + Gets the owner associated with the specified primary group. + The owner associated with the specified group. + The primary group for which to get the owner. + + + + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns null if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + The SDDL representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + true if the group associated with the securable object has been modified; otherwise, false. + + + Gets a Boolean value that specifies whether this object is a container object. + true if the object is a container object; otherwise, false. + + + Gets a Boolean value that specifies whether this object is a directory object. + true if the object is a directory object; otherwise, false. + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + true if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, false. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + true if the DACL is successfully modified; otherwise, false. + The modification to apply to the DACL. + The access rule to modify. + true if the DACL is successfully modified; otherwise, false. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + true if the DACL is successfully modified; otherwise, false. + The modification to apply to the DACL. + The access rule to modify. + true if the DACL is successfully modified; otherwise, false. + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + true if the SACL is successfully modified; otherwise, false. + The modification to apply to the SACL. + The audit rule to modify. + true if the SACL is successfully modified; otherwise, false. + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + true if the SACL is successfully modified; otherwise, false. + The modification to apply to the SACL. + The audit rule to modify. + true if the SACL is successfully modified; otherwise, false. + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + true if the owner of the securable object has been modified; otherwise, false. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + true to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. For more information, see Remarks. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + true to protect the access rules associated with this object from inheritance; false to allow inheritance. + true to preserve inherited access rules; false to remove inherited access rules. This parameter is ignored if is false. + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + true to protect the audit rules associated with this object from inheritance; false to allow inheritance. + true to preserve inherited audit rules; false to remove inherited audit rules. This parameter is ignored if is false. + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + true if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + true if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + true if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + true if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + true if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + Represents a user account. + The access type. + true if the access rule is inherited; otherwise, false. + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Returns the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + true if the access rule is inherited; otherwise, false. + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + Returns true if the access rule was successfully removed; otherwise, false. + The rule to remove. + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + Returns true if the object was removed; otherwise, false. + The audit rule to remove + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the parameter is not a null reference (Nothing in Visual Basic), the current exception is raised in a catch block that handles the inner exception. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + true if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The ACE at the specified index. + The zero-based index of the ACE to get or set. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify null to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + true if this method successfully removes the specified audit rule; otherwise, false. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + true if this method successfully removes the specified audit rule; otherwise, false. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + true if this method successfully removes the specified audit rule; otherwise, false. + The for which to remove an audit rule. + The for which to remove an audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non-null values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/de/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/de/System.Security.AccessControl.xml new file mode 100644 index 0000000..700e126 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/de/System.Security.AccessControl.xml @@ -0,0 +1,1942 @@ + + + + System.Security.AccessControl + + + + Gibt die Aktionen an, die für sicherungsfähige Objekte zulässig sind. + + + Gibt lesegeschützten Zugriff an. + + + Gibt keinen Zugriff an. + + + Gibt schreibgeschützten Zugriff an. + + + Gibt den Typ der auszuführenden Zugriffssteuerungsänderung an.Diese Enumeration wird von Methoden der -Klasse und ihrer untergeordneten Klassen verwendet. + + + Fügen Sie der Zugriffssteuerungsliste (ACL) die angegebene Autorisierungsregel hinzu. + + + Entfernen Sie die Autorisierungsregeln, die die gleiche Sicherheits-ID (SID) und die gleiche Zugriffsmaske wie die angegebene Autorisierungsregel aus der Zugriffssteuerungsliste enthalten. + + + Entfernen Sie Autorisierungsregeln, die die gleiche SID wie die angegebene Autorisierungsregel aus der Zugriffssteuerungsliste enthalten. + + + Entfernen Sie Autorisierungsregeln, die genau mit der angegebenen Autorisierungsregel aus der Zugriffssteuerungsliste übereinstimmen. + + + Entfernen Sie Autorisierungsregeln, die die gleiche SID wie die angegebene Autorisierungsregel aus der Zugriffssteuerungsliste enthalten, und fügen Sie anschließend der Zugriffssteuerungsliste die angegebene Autorisierungsregel hinzu. + + + Entfernen Sie alle Autorisierungsregeln aus der Zugriffssteuerungsliste. Fügen Sie danach der Zugriffssteuerungsliste die angegebene Autorisierungsregel hinzu. + + + Gibt an, welche Abschnitte einer Sicherheitsbeschreibung gespeichert oder geladen werden sollen. + + + Die DACL (Discretionary Access Control List). + + + Die vollständige Sicherheitsbeschreibung. + + + Die SACL (System Access Control List). + + + Die primäre Gruppe. + + + Keine Abschnitte. + + + Der Besitzer. + + + Gibt an, ob zum Gewähren oder Verweigern des Zugriffs ein -Objekt verwendet wird.Diese Werte sind keine Flags, und sie können nicht kombiniert werden. + + + Mithilfe des -Objekts wird der Zugriff auf ein gesichertes Objekt zugelassen. + + + Mithilfe des -Objekts wird der Zugriff auf ein gesichertes Objekt verweigert. + + + Stellt eine Kombination der Identität eines Benutzers, einer Zugriffsmaske und eines Zugriffssteuerungstyps (gewähren oder verweigern) dar.Ein -Objekt enthält auch Informationen darüber, wie die Regel von untergeordneten Objekten geerbt wird und wie die Vererbung weitergegeben wird. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt.Dabei muss es sich um ein Objekt handeln, das in einen umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, wenn diese Regel von einem übergeordneten Container geerbt wird. + Die Vererbungseigenschaften der Zugriffsregel. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der gültige Zugriffssteuerungstyp. + Der Wert des -Parameters kann nicht in einen umgewandelt werden, oder der -Parameter enthält einen ungültigen Wert. + Der Wert des -Parameters ist 0 (null), oder der -Parameter bzw. der -Parameter enthalten nicht erkannte Flagwerte. + + + Ruft den -Wert ab, der diesem -Objekt zugeordnet ist. + Der , der diesem -Objekt zugeordnet sind. + + + Stellt eine Kombination der Identität eines Benutzers, einer Zugriffsmaske und eines Zugriffssteuerungstyps (gewähren oder verweigern) dar.Ein AccessRule`1 Objekt enthält auch Informationen darüber, wie die Regel von untergeordneten Objekten geerbt und wie die Vererbung weitergegeben wird. + Der Zugriffsrechtetyp für die Zugriffsregel. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt. + Die Rechte der Zugriffsregel. + Der gültige Zugriffssteuerungstyp. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt. + Die Rechte der Zugriffsregel. + Die Vererbungseigenschaften der Zugriffsregel. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der gültige Zugriffssteuerungstyp. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt. + Die Rechte der Zugriffsregel. + Der gültige Zugriffssteuerungstyp. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt. + Die Rechte der Zugriffsregel. + Die Vererbungseigenschaften der Zugriffsregel. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der gültige Zugriffssteuerungstyp. + + + Ruft die Rechte der aktuellen Instanz ab. + Die Berechtigungen, Umwandlung als Typ <T>, der aktuellen Instanz. + + + Bietet die Möglichkeit, die Access Control Entries (ACEs – Zugriffssteuerungseinträge) in einer Access Control List (ACL – Zugriffssteuerungsliste) zu durchlaufen. + + + Ruft das aktuelle Element in der -Auflistung ab.Diese Eigenschaft ruft die typfreundliche Version des Objekts ab. + Das aktuelle Element in der -Auflistung. + + + Setzt den Enumerator auf das nächste Element der -Auflistung. + true, wenn der Enumerator erfolgreich auf das nächste Element gesetzt wurde, false, wenn der Enumerator das Ende der Auflistung überschritten hat. + Die Auflistung wurde nach dem Erstellen des Enumerators geändert. + + + Legt den Enumerator auf seine anfängliche Position vor dem ersten Element in der -Auflistung fest. + Die Auflistung wurde nach dem Erstellen des Enumerators geändert. + + + + Gibt das Vererbungs- und Überwachungsverhalten eines Zugriffssteuerungseintrags (ACE) an. + + + Alle Zugriffsversuche werden überwacht. + + + Die Zugriffsmaske wird an untergeordnete Containerobjekte weitergegeben. + + + Fehlgeschlagene Zugriffsversuche werden überwacht. + + + Ein logische OR-Verknüpfung von , , und . + + + Ein ACE wird von einem übergeordneten Container geerbt und nicht explizit für ein Objekt festgelegt. + + + Die Zugriffsmaske wird nur an untergeordnete Objekte weitergegeben.Dies schließt untergeordnete Container- und Endobjekte ein. + + + Es sind keine ACE-Flags festgelegt. + + + Die Zugriffsprüfungen gelten nicht für das Objekt. Sie gelten nur für dessen untergeordnete Elemente. + + + Die Zugriffsmaske wird an untergeordnete Endobjekte weitergegeben. + + + Erfolgreiche Zugriffsversuche werden überwacht. + + + Gibt die Funktion eines Zugriffssteuerungseintrags (Access Control Entry, ACE) an. + + + Zugriff zulassen. + + + Zugriff verweigern. + + + Systemwarnsignal auslösen. + + + Systemüberwachung veranlassen. + + + Definiert die verfügbaren Typen von ACEs (Access Control Entries, Zugriffssteuerungseinträge). + + + Gewährt einem bestimmten durch ein -Objekt identifizierten Vertrauensnehmer den Zugriff auf ein Objekt. + + + Gewährt einem bestimmten durch ein -Objekt identifizierten Vertrauensnehmer den Zugriff auf ein Objekt.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Gewährt den Zugriff auf ein Objekt, eine Gruppe von Eigenschaften oder eine Eigenschaft.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dem das System den Zugriff gewährt.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Definiert, aber nicht verwendet.Wird hier nur aus Gründen der Vollständigkeit aufgeführt. + + + Gewährt den Zugriff auf ein Objekt, eine Gruppe von Eigenschaften oder eine Eigenschaft.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dem das System den Zugriff gewährt.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern. + + + Verweigert einem bestimmten durch ein -Objekt identifizierten Vertrauensnehmer den Zugriff auf ein Objekt. + + + Verweigert einem bestimmten durch ein -Objekt identifizierten Vertrauensnehmer den Zugriff auf ein Objekt.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Verweigert den Zugriff auf ein Objekt, eine Gruppe von Eigenschaften oder eine Eigenschaft.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dem das System den Zugriff gewährt.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Verweigert den Zugriff auf ein Objekt, eine Gruppe von Eigenschaften oder eine Eigenschaft.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dem das System den Zugriff gewährt.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern. + + + Verfolgt den maximalen definierten ACE-Typ in der Enumeration nach. + + + Für zukünftige Verwendung reserviert. + + + Für zukünftige Verwendung reserviert. + + + Für zukünftige Verwendung reserviert. + + + Für zukünftige Verwendung reserviert. + + + Bewirkt, dass eine Überwachungsmeldung protokolliert wird, wenn ein angegebener Vertrauensnehmer versucht, den Zugriff auf ein Objekt zu erhalten.Der Vertrauensnehmer wird durch ein -Objekt identifiziert. + + + Bewirkt, dass eine Überwachungsmeldung protokolliert wird, wenn ein angegebener Vertrauensnehmer versucht, den Zugriff auf ein Objekt zu erhalten.Der Vertrauensnehmer wird durch ein -Objekt identifiziert.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Bewirkt, dass eine Überwachungsmeldung protokolliert wird, wenn ein angegebener Vertrauensnehmer versucht, den Zugriff auf ein Objekt oder Unterobjekte wie Eigenschaften oder Gruppen von Eigenschaften zu erhalten.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts oder Unterobjekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dessen Zugriffe das System überwacht.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern.Dieser ACE-Typ enthält möglicherweise optionale Rückrufdaten.Bei den Rückrufdaten handelt es sich um ein spezifisches BLOB des Ressourcen-Managers, das nicht interpretiert wird. + + + Bewirkt, dass eine Überwachungsmeldung protokolliert wird, wenn ein angegebener Vertrauensnehmer versucht, den Zugriff auf ein Objekt oder Unterobjekte wie Eigenschaften oder Gruppen von Eigenschaften zu erhalten.Der ACE enthält eine Gruppe von Zugriffsrechten, eine GUID, die den Typ des Objekts oder Unterobjekts identifiziert, und ein -Objekt, das den Vertrauensnehmer identifiziert, dessen Zugriffe das System überwacht.Der ACE enthält außerdem eine GUID und verschiedene Flags, die die Vererbung des ACE an untergeordnete Objekte steuern. + + + Gibt die Bedingungen für das Überwachen von Zugriffsversuchen auf ein sicherungsfähiges Objekt an. + + + Fehlgeschlagene Zugriffsversuche sollen überwacht werden. + + + Es sollen keine Zugriffsversuche überwacht werden. + + + Erfolgreiche Zugriffsversuche sollen überwacht werden. + + + Stellt eine Kombination aus der Identität eines Benutzers und einer Zugriffsmaske dar.Ein -Objekt enthält darüber hinaus Informationen zum Erben der Regel durch untergeordnete Objekte, zur Weitergabe der Vererbung sowie zu den Überwachungsbedingungen. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Werte. + Die Identität, auf die die Überwachungsregel angewendet wird.Dabei muss es sich um ein Objekt handeln, das in eine umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, um diese Regel von einem übergeordneten Container zu erben. + Die Vererbungseigenschaften der Überwachungsregel. + Gibt an, ob geerbte Überwachungsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Die Bedingungen, für die die Regel überwacht wird. + Der Wert des -Parameters kann nicht in eine umgewandelt werden, oder der -Parameter enthält einen ungültigen Wert. + Der Wert des -Parameters ist 0 (null), oder der -Parameter bzw. der -Parameter enthalten nicht erkannte Flagwerte. + + + Ruft die Überwachungsflags für diese Überwachungsregel ab. + Eine bitweise Kombination der Enumerationswerte.Diese Kombination gibt die Überwachungsbedingungen für diese Überwachungsregel an. + + + Stellt eine Kombination aus der Identität eines Benutzers und einer Zugriffsmaske dar. + + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die diese Überwachungsregel gilt. + Die Rechte der Überwachungsregel. + Die Bedingungen, für die die Regel überwacht wird. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, auf die die Überwachungsregel angewendet wird. + Die Rechte der Überwachungsregel. + Die Vererbungseigenschaften der Überwachungsregel. + Gibt an, ob geerbte Überwachungsregeln automatisch weitergegeben werden. + Die Bedingungen, für die die Regel überwacht wird. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, auf die die Überwachungsregel angewendet wird. + Die Rechte der Überwachungsregel. + Die Eigenschaften der Überwachungsregel. + + + Initialisiert eine neue Instanz der AccessRule’1-Klasse unter Verwendung der angegebenen Werte. + Die Identität, auf die die Überwachungsregel angewendet wird. + Die Rechte der Überwachungsregel. + Die Vererbungseigenschaften der Überwachungsregel. + Gibt an, ob geerbte Überwachungsregeln automatisch weitergegeben werden. + Die Bedingungen, für die die Regel überwacht wird. + + + Die Rechte der Überwachungsregel. + Gibt zurück. + + + Bestimmt den Zugriff auf sicherungsfähige Objekte.Die abgeleiteten Klassen und bieten Spezialisierungen für Zugriffs- und Überwachungsfunktionen. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Werte. + Die Identität, für die die Zugriffsregel gilt. Dabei muss es sich um ein Objekt handeln, das in einen umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, um diese Regel von einem übergeordneten Container zu erben. + Die Vererbungseigenschaften der Zugriffsregel. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der Wert des -Parameters kann nicht in einen umgewandelt werden. + Der Wert des -Parameters ist 0 (null), oder der -Parameter bzw. der -Parameter enthalten nicht erkannte Flagwerte. + + + Ruft die Zugriffsmaske für diese Regel ab. + Die Zugriffsmaske für diese Regel. + + + Ruft die ab, für die diese Regel gilt. + Die , für die diese Regel gilt. + + + Ruft den Wert von Flags ab, mit denen bestimmt wird, wie diese Regel von untergeordneten Objekten geerbt wird. + Eine bitweise Kombination der Enumerationswerte. + + + Ruft einen Wert ab, der angibt, ob diese Regel explizit festgelegt oder von einem übergeordneten Containerobjekt geerbt wird. + true, wenn diese Regel nicht explizit festgelegt wird, sondern von einem übergeordneten Container geerbt wird. + + + Ruft den Wert der Weitergabeflags ab, die bestimmen, wie die Vererbung dieser Regel an untergeordnete Objekte weitergegeben wird.Diese Eigenschaft ist nur dann relevant, wenn der Wert der -Enumeration nicht ist. + Eine bitweise Kombination der Enumerationswerte. + + + Stellt eine Auflistung von-Objekten dar. + + + Initialisiert eine neue Instanz der -Klasse. + + + Fügt der Auflistung ein -Objekt hinzu. + Das -Objekt, das der Auflistung hinzugefügt werden soll. + + + Kopiert den Inhalt der Auflistung in ein Array. + Ein Array, in das der Inhalt der Auflistung kopiert werden soll. + Der auf 0 (null) basierende Index, ab dem kopiert wird. + + + + Ruft das -Objekt am angegebenen Index der Auflistung ab. + Das -Objekt am angegebenen Index. + Der nullbasierte Index des abzurufenden -Objekts. + + + + + + + Stellt einen Zugriffssteuerungseintrag (ACE) dar. + + + Initialisiert eine neue Instanz der-Klasse. + Flags, die Informationen zu Vererbung, Vererbungsweitergabe und Überwachungsbedingungen für den neuen Zugriffssteuerungseintrag (ACE) angeben. + Die Verwendung des neuen ACE. + Die Zugriffsmaske für den ACE. + Der dem neuen ACE zugeordnete . + true, um anzugeben, dass der neue ACE ein Rückruftyp-ACE ist. + Dem neuen ACE zugeordnete opake Daten.Opake Daten sind nur für Rückruf-ACE-Typen zugelassen.Die Länge dieses Arrays darf nicht größer sein als der Rückgabewert der -Methode. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Bytes) ab.Verwenden Sie diese Länge in Verbindung mit der -Methode vor dem Marshallen der ACL in ein binäres Array. + Die Länge der binären Darstellung des aktuellen -Objekts (in Bytes). + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt des -Objekts gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den ganzen in das -Array zu kopieren. + + + Gibt die maximal zulässige Länge eines opaken Daten-BLOBs für Rückruf-ACEs (Access Control Entry – Zugriffssteuerungseintrag) zurück. + Die zulässige Länge eines opaken Daten-BLOBs. + true, um anzugeben, dass das -Objekt ein Rückruf-ACE-Typ ist. + + + Stellt eine Zugriffssteuerungsliste (ACL) dar und ist die Basisklasse für die -Klasse und die -Klasse. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Bytes) ab.Diese Länge muss verwendet werden, bevor die Zugriffssteuerungsliste (ACL) mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Bytes). + + + Ruft die Anzahl der ACEs im aktuellen -Objekt ab. + Die Anzahl der ACEs im aktuellen -Objekt. + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + + Ruft einen booleschen Wert ab, der angibt, ob sich die Zugriffssteuerungseinträge (ACEs) im aktuellen -Objekt in kanonischer Reihenfolge befinden. + true, wenn sich die ACEs im aktuellen -Objekt in kanonischer Reihenfolge befinden, andernfalls false. + + + Legt fest, ob das -Objekt ein Container ist. + true, wenn das aktuelle -Objekt ein Container ist. + + + Legt fest, ob das aktuelle -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + true, wenn das aktuelle -Objekt eine ACL für ein Verzeichnisobjekt ist. + + + Ruft die -Klasse am angegebenen Index ab oder legt diese fest. + Der am angegebenen Index. + Der nullbasierte Index von , der abgerufen oder festgelegt werden soll. + + + Entfernt alle Zugriffssteuerungseinträge (ACEs) in diesem -Objekt, die dem angegebenen -Objekt zugeordnet sind. + Das -Objekt, für das eine Überprüfung erfolgen soll. + + + Entfernt alle geerbten Zugriffssteuerungseinträge (ACEs) aus diesem -Objekt. + + + Ruft die Revisionsebene der ab. + Ein Bytewert, der die Revisionsebene der angibt. + + + Steuert den Zugriff auf Objekte, ohne dass ACLs (Access Control Lists, Zugriffssteuerungslisten) dabei direkt bearbeitet werden.Diese Klasse ist die abstrakte Basisklasse für die -Klasse. + + + Initialisiert eine neue Instanz der -Klasse. + true, wenn das neue Objekt ein Containerobjekt ist. + + + Fügt der DACL (Discretionary Access Control List), die diesem -Objekt zugeordnet ist, die angegebene Zugriffsregel hinzu. + Die hinzuzufügende Zugriffsregel. + + + Fügt der SACL (System Access Control List), die diesem -Objekt zugeordnet ist, die angegebene Überwachungsregel hinzu. + Die hinzuzufügende Überwachungsregel. + + + Ruft eine Auflistung der Zugriffsregeln ab, die der angegebenen Sicherheits-ID zugeordnet sind. + Die Auflistung der Zugriffsregeln, die dem angegebenen -Objekt zugeordnet sind. + true, um explizit für das Objekt festgelegte Zugriffsregeln einzuschließen. + true, um geerbte Zugriffsregeln einzuschließen. + Gibt an, ob die Sicherheits-ID, für die Zugriffsregeln abgerufen werden sollen, vom Typ T:System.Security.Principal.SecurityIdentifier oder vom Typ T:System.Security.Principal.NTAccount ist.Der Wert dieses Parameters muss ein Typ sein, der in den -Typ übersetzt werden soll. + + + + + + Ruft eine Auflistung der Überwachungsregeln ab, die der angegebenen Sicherheits-ID zugeordnet sind. + Die Auflistung der Überwachungsregeln, die dem angegebenen -Objekt zugeordnet sind. + true, um explizit für das Objekt festgelegte Überwachungsregeln einzuschließen. + true, um geerbte Überwachungsregeln einzuschließen. + Die Sicherheits-ID, für die Überwachungsregeln abgerufen werden sollen.Dabei muss es sich um ein Objekt handeln, das in ein -Objekt umgewandelt werden kann. + + + + + + Wendet die angegebene Änderung auf die DACL an, die diesem -Objekt zugeordnet ist. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die DACL angewendet werden soll. + Die zu ändernde Zugriffsregel. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + + + Wendet die angegebene Änderung auf die SACL (System Access Control List) an, die diesem -Objekt zugeordnet ist. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die SACL angewendet werden soll. + Die zu ändernde Überwachungsregel. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + + + Entfernt Zugriffsregeln, die dieselbe Sicherheits-ID und dieselbe Zugriffsmaske wie die angegebene Zugriffsregel enthalten, aus der DACL (Discretionary Access Control List), die diesem -Objekt zugeordnet ist. + true, wenn die Zugriffsregel erfolgreich entfernt wurde; andernfalls false. + Die zu entfernende Zugriffsregel. + + + Entfernt alle Zugriffsregeln, die dieselbe Sicherheits-ID wie die angegebene Zugriffsregel enthalten, aus der DACL (Discretionary Access Control List), die diesem -Objekt zugeordnet ist. + Die zu entfernende Zugriffsregel. + + + Entfernt alle Zugriffsregeln, die der angegebenen Zugriffsregel genau entsprechen, aus der DACL (Discretionary Access Control List), die diesem -Objekt zugeordnet ist. + Die zu entfernende Zugriffsregel. + + + Entfernt Überwachungsregeln, die dieselbe Sicherheits-ID und dieselbe Zugriffsmaske wie die angegebene Überwachungsregel enthalten, aus der SACL (System Access Control List), die diesem -Objekt zugeordnet ist. + true, wenn die Überwachungsregel erfolgreich entfernt wurde; andernfalls false. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Überwachungsregeln, die dieselbe Sicherheits-ID wie die angegebene Überwachungsregel enthalten, aus der SACL (System Access Control List), die diesem -Objekt zugeordnet ist. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Überwachungsregeln, die der angegebenen Überwachungsregel genau entsprechen, aus der SACL, die diesem -Objekt zugeordnet ist. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Zugriffsregeln in der DACL, die diesem -Objekt zugeordnet ist, und fügt anschließend die angegebene Zugriffsregel hinzu. + Die zurückzusetzende Zugriffsregel. + + + Entfernt alle Zugriffsregeln, die dieselbe Sicherheits-ID und denselben Qualifizierer wie die angegebene Zugriffsregel in der DACL (Discretionary Access Control List) enthalten, die diesem -Objekt zugeordnet ist, und fügt anschließend die angegebene Zugriffsregel hinzu. + Die festzulegende Zugriffsregel. + + + Entfernt alle Überwachungsregeln, die dieselbe Sicherheits-ID und denselben Qualifizierer wie die angegebene Überwachungsregel in der SACL (System Access Control List) enthalten, die diesem -Objekt zugeordnet ist, und fügt anschließend die angegebene Überwachungsregel hinzu. + Die festzulegende Überwachungsregel. + + + Stellt eine Sicherheitsbeschreibung dar.Zu einer Sicherheitsbeschreibung gehören ein Besitzer, eine primäre Gruppe, eine besitzerverwaltete Zugriffssteuerungsliste (Discretionary Access Control List, DACL) und eine System-Zugriffssteuerungsliste (System Access Control List, SACL). + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen Arrays von Bytewerten. + true, wenn die neue Sicherheitsbeschreibung einem Containerobjekt zugeordnet ist. + true, wenn die neue Sicherheitsbeschreibung einem Verzeichnisobjekt zugeordnet ist. + Das Array von Bytewerten, aus dem das neue -Objekt erstellt werden soll. + Der Offset im -Array, an dem mit dem Kopieren begonnen werden soll. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Informationen. + true, wenn die neue Sicherheitsbeschreibung einem Containerobjekt zugeordnet ist. + true, wenn die neue Sicherheitsbeschreibung einem Verzeichnisobjekt zugeordnet ist. + Flags, die das Verhalten des neuen -Objekts angeben. + Der Besitzer des neuen -Objekts. + Die primäre Gruppe für das neue -Objekt. + Die SACL für das neue -Objekt. + Die DACL für das neue -Objekt. + + + Initialisiert eine neue Instanz der -Klasse mit dem angegebenen -Objekt. + true, wenn die neue Sicherheitsbeschreibung einem Containerobjekt zugeordnet ist. + true, wenn die neue Sicherheitsbeschreibung einem Verzeichnisobjekt zugeordnet ist. + Das -Objekt, aus dem das neue -Objekt erstellt werden soll. + + + Initialisiert eine neue Instanz der -Klasse mit der angegebenen SDDL-Zeichenfolge (Security Descriptor Definition Language). + true, wenn die neue Sicherheitsbeschreibung einem Containerobjekt zugeordnet ist. + true, wenn die neue Sicherheitsbeschreibung einem Verzeichnisobjekt zugeordnet ist. + Die SDDL-Zeichenfolge, aus der das neue -Objekt erstellt werden soll. + + + Legt die -Eigenschaft für diese Instanz und setzt die Flag. + Die Revisionsebene des neuen -Objekts. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Legt die -Eigenschaft für diese Instanz und setzt die Flag. + Die Revisionsebene des neuen -Objekts. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Ruft Werte ab, die das Verhalten des -Objekts angeben. + Mindestens ein Wert der -Enumeration, kombiniert mit einem logischen Operator OR. + + + Ruft die DACL für dieses -Objekt ab oder legt diese fest.Die DACL enthält Zugriffsregeln. + Die DACL für dieses -Objekt. + + + Ruft die primäre Gruppe für dieses -Objekt ab oder legt diese fest. + Die primäre Gruppe für dieses -Objekt. + + + Ruft einen booleschen Wert ab, der angibt, ob das diesem -Objekt zugeordnete Objekt ein Containerobjekt ist. + true, wenn das diesem -Objekt zugeordnete Objekt ein Containerobjekt ist, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordnete DACL eine kanonische Reihenfolge aufweist. + true, wenn die diesem -Objekt zugeordnete DACL eine kanonische Reihenfolge aufweist, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob das diesem -Objekt zugeordnete Objekt ein Verzeichnisobjekt ist. + true, wenn das diesem -Objekt zugeordnete Objekt ein Verzeichnisobjekt ist, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordnete SACL eine kanonische Reihenfolge aufweist. + true, wenn die diesem -Objekt zugeordnete SACL eine kanonische Reihenfolge aufweist, andernfalls false. + + + Ruft den Besitzer des Objekts ab, dem dieses -Objekt zugeordnet ist. + Der Besitzer des Objekts, dem dieses -Objekt zugeordnet ist. + + + Entfernt alle Zugriffsregeln für die angegebene Sicherheits-ID aus der diesem Objekt zugeordneten DACL. + Die Sicherheits-ID, für die Zugriffsregeln entfernt werden sollen. + + + Entfernt alle Überwachungsregeln für die angegebene Sicherheits-ID aus der diesem -Objekt zugeordneten SACL. + Die Sicherheits-ID, für die Überwachungsregeln entfernt werden sollen. + + + Legt den Vererbungsschutz für die DACL fest, die diesem -Objekt zugeordnet ist.Geschützte DACLs erben keine Zugriffsregeln von übergeordneten Containern. + true, wenn die DACL vor Vererbung geschützt werden soll. + true, wenn geerbte Zugriffsregeln in der DACL beibehalten werden sollen, false, wenn geerbte Zugriffsregeln aus der DACL entfernt werden sollen. + + + Legt den Vererbungsschutz für die SACL fest, die diesem -Objekt zugeordnet ist.Geschützte SACLs erben keine Überwachungsregeln von übergeordneten Containern. + true, wenn die SACL vor Vererbung geschützt werden soll. + true, wenn geerbte Überwachungsregeln in der SACL beibehalten werden sollen, false, wenn geerbte Überwachungsregeln aus der SACL entfernt werden sollen. + + + Ruft die SACL für dieses -Objekt ab oder legt diese fest.Die SACL enthält Überwachungsregeln. + Die SACL für dieses -Objekt. + + + Stellt einen zusammengesetzten ACE (Access Control Entry, Zugriffssteuerungseintrag) dar. + + + Initialisiert eine neue Instanz der -Klasse. + Enthält Flags, die Informationen zu Vererbung, Vererbungsweitergabe und Überwachungsbedingungen für den neuen ACE angeben. + Die Zugriffsmaske für den ACE. + Ein Wert aus der -Enumeration. + Der dem neuen ACE zugeordnete . + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Byte) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Byte). + + + Ruft den Typ dieses -Objekts ab oder legt diesen fest. + Der Typ dieses -Objekts. + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Gibt den Typ eines -Objekts an. + + + Das -Objekt wird für Identitätswechsel verwendet. + + + Diese Flags wirken sich auf das Verhalten der Sicherheitsbeschreibung aus. + + + Gibt an, dass die freigegebene Zugriffssteuerungsliste (DACL – Discretionary Access Control List) automatisch vom übergeordneten Element geerbt wurde.Wird nur von Ressourcen-Managern festgelegt. + + + Sie wird ignoriert. + + + Gibt an, dass die DACL durch einen Standardmechanismus abgerufen wurde.Wird nur von Ressourcen-Managern festgelegt. + + + Gibt an, dass die DACL nicht null ist.Wird von Ressourcen-Managern oder Benutzern festgelegt. + + + Gibt an, dass der Ressourcen-Manager eine automatische Vererbung verhindert.Wird von Ressourcen-Managern oder Benutzern festgelegt. + + + Sie wird ignoriert. + + + Gibt an, dass der der Gruppe durch einen Standardmechanismus abgerufen wurde.Wird nur von Ressourcen-Manager festgelegt und darf nicht durch Aufrufer festgelegt werden. + + + Keine Steuerungsflags. + + + Gibt an, dass der des Besitzers durch einen Standardmechnismus abgerufen wurde.Wird nur von Ressourcen-Manager festgelegt und darf nicht durch Aufrufer festgelegt werden. + + + Gibt an, dass der Inhalt des Felds "Reserved" gültig ist. + + + Gibt an, dass die binäre Darstellung der Sicherheitsbeschreibung im selbstbezogenen Format vorliegt. Dieses Flag wird immer festgelegt. + + + Sie wird ignoriert. + + + Gibt an, dass die freigegebene Zugriffsliste (SACL – System Access Control List) automatisch vom übergeordneten Element geerbt wurde.Wird nur von Ressourcen-Managern festgelegt. + + + Sie wird ignoriert. + + + Gibt an, dass die SACL (System Access Control List, Systemzugriffssteuerungsliste) durch einen Standardmechanismus abgerufen wurde.Wird nur von Ressourcen-Managern festgelegt. + + + Gibt an, dass die SACL nicht null ist.Wird von Ressourcen-Managern oder Benutzern festgelegt. + + + Gibt an, dass der Ressourcen-Manager eine automatische Vererbung verhindert.Wird von Ressourcen-Managern oder Benutzern festgelegt. + + + Stellt einen Zugriffssteuerungseintrag (ACE – Access Control Entry) dar, der nicht durch einen der Member der -Enumeration definiert ist. + + + Initialisiert eine neue Instanz der -Klasse. + Typ des neuen Zugriffssteuerungseintrags (ACE).Dieser Wert muss größer als sein. + Flags, die Informationen zu Vererbung, Weitergabe der Vererbung und Überwachungsbedingungen für den neuen ACE angeben. + Ein Array von Bytewerten, das die Daten für den neuen ACE enthält.Dieser Wert kann null sein.Die Länge dieses Arrays darf nicht größer als der Wert des -Felds sein und muss ein Vielfaches von vier sein. + Der Wert des -Parameters ist nicht größer als , oder die Länge des -Arrays ist größer als der Wert des -Felds oder kein Vielfaches von vier. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Byte) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Byte). + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Gibt die Länge der opaken Daten an, die diesem -Objekt zugeordnet sind. + Ein Array von Bytewerten, das die opaken Daten darstellt, die diesem -Objekt zugeordnet sind. + + + Gibt die maximal zulässige Länge eines nicht opaken Daten-BLOBs für dieses-Objekt zurück. + + + Ruft die Länge der opaken Daten ab, die diesem -Objekt zugeordnet sind. + Die Länge der opaken Rückrufdaten. + + + Legt die opaken Rückrufdaten fest, die diesem -Objekt zugeordnet sind. + Ein Array von Bytewerten, das die opaken Rückrufdaten für dieses -Objekt darstellt. + + + Stellt eine DACL (Discretionary Access Control List, freigegebene Zugriffssteuerungsliste) dar. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Die Revisionsebene des neuen -Objekts. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten des angegebenen -Objekts. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Das zugrunde liegende -Objekt für das neue -Objekt.Geben Sie null an, um eine leere ACL zu erstellen. + + + Fügt dem aktuellen -Objekt einen ACE mit den angegebenen Einstellungen hinzu. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der hinzugefügt werden soll. + Der , dem ein ACE hinzugefügt werden soll. + Die Zugriffsregel für den neuen ACE. + Flags, die die Vererbungseigenschaften des neuen ACE angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für den neuen ACE angeben. + + + Fügt dem aktuellen -Objekt einen ACE mit den angegebenen Einstellungen hinzu.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp des neuen ACE angeben. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der hinzugefügt werden soll. + Der , dem ein ACE hinzugefügt werden soll. + Die Zugriffsregel für den neuen ACE. + Flags, die die Vererbungseigenschaften des neuen ACE angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für den neuen ACE angeben. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die der neue ACE gilt. + Die Identität der Klasse von untergeordneten Objekten, die den neuen ACE erben können. + + + Fügt dem aktuellen -Objekt einen ACE mit den angegebenen Einstellungen hinzu. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der hinzugefügt werden soll. + Der , dem ein ACE hinzugefügt werden soll. + Die für den neuen Zugriff. + + + Entfernt die angegebene Zugriffssteuerungsregel aus dem aktuellen -Objekt. + true, wenn diese Methode den angegebenen Zugriff erfolgreich entfernt hat, andernfalls false. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den eine Zugriffssteuerungsregel entfernt werden soll. + Die Zugriffsmaske für die Regel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Regel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Regel angeben, die entfernt werden sollen. + + + Entfernt die angegebene Zugriffssteuerungsregel aus dem aktuellen -Objekt.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp angeben. + true, wenn diese Methode den angegebenen Zugriff erfolgreich entfernt hat, andernfalls false. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den eine Zugriffssteuerungsregel entfernt werden soll. + Die Zugriffsmaske für die Zugriffssteuerungsregel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Zugriffssteuerungsregel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Zugriffssteuerungsregel angeben, die entfernt werden sollen. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die die entfernte Zugriffssteuerungsregel gilt. + Die Identität der Klasse von untergeordneten Objekten, die die entfernte Zugriffssteuerungsregel erben können. + + + Entfernt die angegebene Zugriffssteuerungsregel aus dem aktuellen -Objekt. + Gibt zurück. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den eine Zugriffssteuerungsregel entfernt werden soll. + Die für den Zugriff zu entfernen. + + + Entfernt den angegebenen ACE aus dem aktuellen -Objekt. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den ein ACE entfernt werden soll. + Die Zugriffsmaske für den ACE, die entfernt werden soll. + Flags, die die Vererbungseigenschaften des ACE angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für den ACE angeben, die entfernt werden sollen. + + + Entfernt den angegebenen ACE aus dem aktuellen -Objekt.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp für den ACE angeben, der entfernt werden soll. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den ein ACE entfernt werden soll. + Die Zugriffsmaske für den ACE, die entfernt werden soll. + Flags, die die Vererbungseigenschaften des ACE angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für den ACE angeben, die entfernt werden sollen. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die der entfernte ACE gilt. + Die Identität der Klasse von untergeordneten Objekten, die den entfernten ACE erben können. + + + Entfernt den angegebenen ACE aus dem aktuellen -Objekt. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der entfernt werden soll. + Der , für den ein ACE entfernt werden soll. + Die für den Zugriff zu entfernen. + + + Legt die angegebene Zugriffssteuerung für das angegebene -Objekt fest. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der festgelegt werden soll. + Der , für den ein ACE festgelegt werden soll. + Die Zugriffsregel für den neuen ACE. + Flags, die die Vererbungseigenschaften des neuen ACE angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für den neuen ACE angeben. + + + Legt die angegebene Zugriffssteuerung für das angegebene -Objekt fest. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der festgelegt werden soll. + Der , für den ein ACE festgelegt werden soll. + Die Zugriffsregel für den neuen ACE. + Flags, die die Vererbungseigenschaften des neuen ACE angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für den neuen ACE angeben. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die der neue ACE gilt. + Die Identität der Klasse von untergeordneten Objekten, die den neuen ACE erben können. + + + Legt die angegebene Zugriffssteuerung für das angegebene -Objekt fest. + Der Typ der Zugriffssteuerung (gewähren oder verweigern), der festgelegt werden soll. + Der , für den ein ACE festgelegt werden soll. + Die für den Zugriff festgelegt. + + + Stellt einen ACE (Access Control Entry, Zugriffssteuerungseintrag) dar und ist die Basisklasse für alle anderen ACE-Klassen. + + + Ruft die Instanz von ab, die diesem -Objekt zugeordnet ist, oder legt diese fest. + Die Instanz von , die diesem -Objekt zugeordnet ist. + + + Ruft den Typ für diesen ACE (Access Control Entry, Zugriffssteuerungseintrag) ab. + Der Typ für diesen ACE. + + + Ruft die diesem ACE (Access Control Entry, Zugriffssteuerungseintrag) zugeordneten Überwachungsinformationen ab. + Die diesem ACE (Access Control Entry, Zugriffssteuerungseintrag) zugeordneten Überwachungsinformationen. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Byte) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Byte). + + + Erstellt eine Tiefenkopie von diesem ACE (Access Control Entry, Zugriffssteuerungseintrag). + Das von dieser Methode erstellte -Objekt. + + + Erstellt ein -Objekt aus den angegebenen binären Daten. + Das von dieser Methode erstellte -Objekt. + Die binären Daten, aus denen das neue -Objekt erstellt werden soll. + Der Offset, bei dem mit dem Rückgängigmachen des Marshallens begonnen werden soll. + + + Bestimmt, ob das angegebene -Objekt mit dem aktuellen -Objekt identisch ist. + true, wenn das angegebene -Objekt gleich dem aktuellen -Objekt ist, andernfalls false. + Das -Objekt, das mit dem aktuellen -Objekt verglichen werden soll. + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Fungiert als eine Hashfunktion für die -Klasse.Sie können die -Methode in Hashalgorithmen und Datenstrukturen wie Hashtabellen verwenden. + Ein Hashcode für das aktuelle -Objekt. + + + Ruft Flags ab, die die Vererbungseigenschaften für diesen ACE (Access Control Entry, Zugriffssteuerungseintrag) angeben. + Flags, die die Vererbungseigenschaften für diesen ACE angeben. + + + Ruft einen booleschen Wert ab, der angibt, ob dieser ACE (Access Control Entry, Zugriffssteuerungseintrag) geerbt oder explizit festgelegt wird. + true, wenn dieser ACE geerbt wird, andernfalls false. + + + Bestimmt, ob die angegebenen -Objekte als gleich betrachtet werden. + true, wenn die beiden -Objekte gleich sind, andernfalls false. + Das erste zu vergleichende -Objekt. + Das zweite zu vergleichende . + + + Bestimmt, ob die angegebenen -Objekte als ungleich betrachtet werden. + true, wenn die beiden -Objekte nicht identisch sind, andernfalls false. + Das erste zu vergleichende -Objekt. + Das zweite zu vergleichende . + + + Ruft Flags ab, die die Eigenschaften der Vererbungsweitergabe für diesen ACE (Access Control Entry, Zugriffssteuerungseintrag) angeben. + Flags, die die Eigenschaften der Vererbungsweitergabe für diesen ACE angeben. + + + Stellt eine Zugriffssteuerungsliste (ACL) dar und ist die Basisklasse für die Klassen , , und . + + + Initialisiert eine neue Instanz der -Klasse. + + + Die Revisionsebene der aktuellen .Dieser Wert wird von der -Eigenschaft für Zugriffssteuerungslisten (ACLs) zurückgegeben, die keinen Verzeichnisdienstobjekten zugeordnet sind. + + + Die Revisionsebene der aktuellen .Dieser Wert wird von der -Eigenschaft für Zugriffssteuerungslisten (ACLs) zurückgegeben, die Verzeichnisdienstobjekten zugeordnet sind. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Byte) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Byte). + + + Kopiert jeden der aktuellen in das angegebene Array. + Das Array, das Kopien der in der aktuellen enthaltenen -Objekte aufnimmt. + Der nullbasierte Index von , an dem der Kopiervorgang beginnt. + + + Ruft die Anzahl der ACEs im aktuellen -Objekt ab. + Die Anzahl der ACEs im aktuellen -Objekt. + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Gibt eine neue Instanz der -Klasse zurück. + Der , den diese Methode zurückgibt. + + + Diese Eigenschaft ist immer auf false festgelegt.Sie ist nur implementiert, weil sie für die Implementierung der -Schnittstelle erforderlich ist. + Immer false. + + + Ruft den am angegebenen Index ab oder legt diesen fest. + Der am angegebenen Index. + Der nullbasierte Index von , der abgerufen oder festgelegt werden soll. + + + Die maximal zulässige binäre Länge eines -Objekts. + + + Ruft die Revisionsebene der ab. + Ein Bytewert, der die Revisionsebene der angibt. + + + Diese Eigenschaft gibt immer null zurück.Sie ist nur implementiert, weil sie für die Implementierung der -Schnittstelle erforderlich ist. + Gibt immer null zurück. + + + Kopiert jeden der aktuellen in das angegebene Array. + Das Array, das Kopien der in der aktuellen enthaltenen -Objekte aufnimmt. + Der nullbasierte Index von , an dem der Kopiervorgang beginnt. + + + Gibt eine neue Instanz der -Klasse zurück, die in eine Instanz der -Schnittstelle konvertiert wurde. + Ein neues -Objekt, das in eine Instanz der -Schnittstelle konvertiert wurde. + + + Stellt eine Sicherheitsbeschreibung dar.Zu einer Sicherheitsbeschreibung gehören ein Besitzer, eine primäre Gruppe, eine DACL und eine SACL. + + + Initialisiert eine neue Instanz der -Klasse. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Byte) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Byte). + + + Ruft Werte ab, die das Verhalten des -Objekts angeben. + Mindestens ein Wert der -Enumeration, kombiniert mit einem logischen Operator OR. + + + Gibt ein Array von Bytewerten zurück, das die in diesem -Objekt enthaltenen Informationen darstellt. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Gibt die SDDL-Darstellung (Security Descriptor Definition Language) der angegebenen Abschnitte der von diesem -Objekt dargestellten Sicherheitsbeschreibung zurück. + Die SDDL-Darstellung der angegebenen Abschnitte der Sicherheitsbeschreibung, die diesem -Objekt zugeordnet ist. + Gibt an, welche Abschnitte (Zugriffsregeln, Überwachungsregeln, primäre Gruppe, Besitzer) der Sicherheitsbeschreibung abgerufen werden sollen. + + + Ruft die primäre Gruppe für dieses -Objekt ab oder legt diese fest. + Die primäre Gruppe für dieses -Objekt. + + + Gibt einen booleschen Wert zurück, der angibt, ob die diesem -Objekt zugeordnete Sicherheitsbeschreibung in das SDDL-Format (Security Descriptor Definition Language) umgewandelt werden kann. + true, wenn die diesem -Objekt zugeordnete Sicherheitsbeschreibung in das SDDL-Format (Security Descriptor Definition Language) umgewandelt werden kann, andernfalls false. + + + Ruft den Besitzer des Objekts ab, dem dieses -Objekt zugeordnet ist. + Der Besitzer des Objekts, dem dieses -Objekt zugeordnet ist. + + + Ruft die Revisionsebene des -Objekts ab. + Ein Bytewert, der die Revisionsebene von angibt. + + + Vererbungsflags geben die Semantik der Vererbung für ACEs (Access Control Entries, Zugriffssteuerungseinträge) an. + + + Der ACE wird von untergeordneten Containerobjekten geerbt. + + + Der ACE wird nicht von untergeordneten Objekten geerbt. + + + Der ACE wird von untergeordneten Endobjekten geerbt. + + + Kapselt alle derzeit von Microsoft Corporation definierten ACE-Typen (Access Control Entry, Zugriffssteuerungseinträge).Alle -Objekte enthalten eine 32-Bit-Zugriffsmaske und ein -Objekt. + + + Ruft die Zugriffsmaske für dieses -Objekt ab oder legt diese fest. + Die Zugriffsmaske für dieses -Objekt. + + + Ruft das -Objekt ab, das diesem -Objekt zugeordnet ist, oder legt dieses fest. + Das diesem -Objekt zugeordnete -Objekt. + + + Bietet die Möglichkeit, Zugriff auf systemeigene Objekte ohne direkte Manipulation von Zugriffssteuerungslisten (Access Control Lists, ACLs) zu steuern.Systemeigene Objekttypen werden von der -Enumeration definiert. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Das Handle des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die in das -Objekt eingefügt werden sollen. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Das Handle des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die in das -Objekt eingefügt werden sollen. + Ein von Integratoren implementierter Delegat, der benutzerdefinierte Ausnahmen bereitstellt. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Werte. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Ein von Integratoren implementierter Delegat, der benutzerdefinierte Ausnahmen bereitstellt. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Der Name des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die in das -Objekt eingefügt werden sollen. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Typ des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Der Name des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die in das -Objekt eingefügt werden sollen. + Ein von Integratoren implementierter Delegat, der benutzerdefinierte Ausnahmen bereitstellt. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Das Handle des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + Das sicherungsfähige Objekt, dem das -Objekt zugeordnet ist, ist ein Verzeichnis oder eine Datei und konnte nicht gefunden werden. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Das Handle des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + Das sicherungsfähige Objekt, dem das -Objekt zugeordnet ist, ist ein Verzeichnis oder eine Datei und konnte nicht gefunden werden. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Der Name des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + Das sicherungsfähige Objekt, dem das -Objekt zugeordnet ist, ist ein Verzeichnis oder eine Datei und konnte nicht gefunden werden. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Der Name des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + Das sicherungsfähige Objekt, dem das -Objekt zugeordnet ist, ist ein Verzeichnis oder eine Datei und konnte nicht gefunden werden. + + + Ermöglicht Integratoren, bestimmten von ihnen erstellen Ausnahmen numerische Fehlercodes zuzuordnen. + Die von diesem Delegaten erstellte . + Der numerische Fehlercode. + Der Name des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Das Handle des sicherungsfähigen Objekts, dem das -Objekt zugeordnet wird. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Stellt eine Kombination der Identität eines Benutzers, einer Zugriffsmaske und eines Zugriffssteuerungstyps (gewähren oder verweigern) dar.Ein -Objekt enthält darüber hinaus Informationen zum Typ des Objekts, auf das die Regel angewendet wird, zum Typ des untergeordneten Objekts, das die Regel erben kann, zur Art und Weise, auf die die Regel von untergeordneten Objekten geerbt wird, sowie zur Übertragung der Vererbung. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + Die Identität, für die die Zugriffsregel gilt. Dabei muss es sich um ein Objekt handeln, das in eine umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, wenn diese Regel von einem übergeordneten Container geerbt wird. + Gibt die Vererbungseigenschaften der Zugriffsregel an. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der Objekttyp, auf den die Regel angewendet wird. + Der Typ des untergeordneten Objekts, das die Regel erben kann. + Gibt an, ob diese Regel Zugriff gewährt oder Zugriff verweigert. + Der Wert des -Parameters kann nicht in einen umgewandelt werden, oder der -Parameter enthält einen ungültigen Wert. + Der Wert des -Parameters ist 0 (null), oder der -Parameter bzw. der -Parameter enthält nicht erkannte Flagwerte. + + + Ruft den Typ des untergeordneten Objekts ab, das das -Objekt erben kann. + Der Typ des untergeordneten Objekts, das das -Objekt erben kann. + + + Ruft Flags ab, die angeben, ob die -Eigenschaft und die -Eigenschaft des -Objekts gültige Werte enthalten. + + gibt an, dass die -Eigenschaft einen gültigen Wert enthält. gibt an, dass die -Eigenschaft einen gültigen Wert enthält.Diese Werte können mit einem logischen OR kombiniert werden. + + + Ruft den Typ des Objekts ab, auf das die angewendet wird. + Der Typ des Objekts, auf das die angewendet wird. + + + Steuert den Zugriff auf Verzeichnisdienste-Objekte.Diese Klasse stellt einen ACE (Access Control Entry, Zugriffssteuerungseintrag) dar, der einem Verzeichnisobjekt zugeordnet ist. + + + Initialisiert eine neue Instanz der -Klasse. + Informationen zu Vererbung, Vererbungsweitergabe und Überwachungsbedingungen für den neuen ACE (Access Control Entry, Zugriffssteuerungseintrag). + Die Verwendung des neuen ACE. + Die Zugriffsmaske für den ACE. + Der dem neuen ACE zugeordnete . + Gibt an, ob der -Parameter und der -Parameter gültige Objekt-GUIDs enthalten. + Eine GUID, die den Objekttyp bezeichnet, auf den der neue ACE angewendet wird. + Eine GUID, die den Objekttyp bezeichnet, der den neuen ACE erben kann. + true, wenn der neue ACE vom Typ Rückruf-ACE ist. + Dem neuen ACE zugeordnete opake Daten.Dies ist nur für Rückruf-ACE-Typen zulässig.Die Länge dieses Arrays darf nicht größer sein als der Rückgabewert der -Methode. + Der Parameter des Qualifizierers enthält einen ungültigen Wert, oder die Länge der Werts für den nicht transparenten Parameter ist größer als der Rückgabewert der -Methode. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts (in Bytes) ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts (in Bytes). + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Ruft die GUID des Objekttyps ab, der den ACE (Access Control Entry, Zugriffssteuerungseintrag) erben kann, den dieses -Objekt darstellt, oder legt diese fest. + Die GUID des Objekttyps, der den ACE (Access Control Entry, Zugriffssteuerungseintrag) erben kann, den dieses -Objekt darstellt. + + + Gibt die maximal zulässige Länge eines nicht transparenten Daten-BLOB für Rückruf-ACEs (Access Control Entry, Zugriffssteuerungseintrag) in Bytes zurück. + Die maximal zulässige Länge eines nicht transparenten Daten-BLOB für Rückruf-ACEs (Access Control Entry, Zugriffssteuerungseintrag) in Bytes. + True, wenn vom Typ Rückruf-ACE ist. + + + Ruft Flags ab, die angeben, ob die -Eigenschaft und die -Eigenschaft Werte enthalten, die gültige Objekttypen angeben, oder legt diese fest. + Mindestens ein Member der -Enumeration, kombiniert mit einer logischen OR-Operation. + + + Ruft die GUID des Objekttyps ab, der diesem -Objekt zugeordnet ist, oder legt diese fest. + Die GUID des Objekttyps, der diesem -Objekt zugeordnet ist. + + + Gibt das Vorhandensein von Objekttypen für ACEs (Access Control Entries, Zugriffssteuerungseinträge) an. + + + Der Objekttyp, der den ACE erben kann. + + + Es sind keine Objekttypen vorhanden. + + + Der Objekttyp, der dem ACE zugeordnet ist, ist vorhanden. + + + Stellt eine Kombination aus der Identität eines Benutzers, einer Zugriffsmaske und Überwachungsbedingungen dar.Ein -Objekt enthält darüber hinaus Informationen zum Typ des Objekts, auf das die Regel angewendet wird, zum Typ des untergeordneten Objekts, das die Regel erben kann, zur Art und Weise, auf die die Regel von untergeordneten Objekten geerbt wird, sowie zur Übertragung der Vererbung. + + + Initialisiert eine neue Instanz der -Klasse. + Die Identität, für die die Zugriffsregel gilt. Dabei muss es sich um ein Objekt handeln, das in eine umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, wenn diese Regel von einem übergeordneten Container geerbt wird. + Gibt die Vererbungseigenschaften der Zugriffsregel an. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Der Objekttyp, auf den die Regel angewendet wird. + Der Typ des untergeordneten Objekts, das die Regel erben kann. + Die Überwachungsbedingungen. + Der Wert des -Parameters kann nicht in einen umgewandelt werden, oder der -Parameter enthält einen ungültigen Wert. + Der Wert des -Parameters ist 0 (null), oder der -Parameter bzw. der -Parameter enthält nicht erkannte Flagwerte. + + + Ruft den Typ des untergeordneten Objekts ab, das das -Objekt erben kann. + Der Typ des untergeordneten Objekts, das das -Objekt erben kann. + + + Die -Eigenschaft und die -Eigenschaft des -Objekts enthalten gültige Werte. + + gibt an, dass die -Eigenschaft einen gültigen Wert enthält. gibt an, dass die -Eigenschaft einen gültigen Wert enthält.Diese Werte können mit einem logischen OR kombiniert werden. + + + Ruft den Typ des Objekts ab, auf das die angewendet wird. + Der Typ des Objekts, auf das die angewendet wird. + + + Bietet die Möglichkeit, den Zugriff auf Objekte ohne direktes Bearbeiten von Zugriffssteuerungslisten (ACLs – Access Control Lists) zu steuern.Diese Klasse ist die abstrakte Basisklasse der -Klasse und der -Klasse. + + + Initialisiert eine neue Instanz der -Klasse. + + + Initialisiert eine neue Instanz der -Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + true, wenn das neue -Objekt ein Verzeichnisobjekt ist. + + + Initialisiert eine neue Instanz der -Klasse. + Der der neuen -Instanz. + + + Ruft den des sicherungsfähigen Objekts ab, das diesem -Objekt zugeordnet ist. + Der Typ des sicherungsfähigen Objekts, das diesem -Objekt zugeordnet ist. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + Das von dieser Methode erstellte -Objekt. + Die Identität, für die die Zugriffsregel gilt.Dabei muss es sich um ein Objekt handeln, das in eine umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, wenn diese Regel von einem übergeordneten Container geerbt wird. + Gibt die Vererbungseigenschaften der Zugriffsregel an. + Gibt an, ob geerbte Zugriffsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Gibt den gültigen Zugriffssteuerungstyp an. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordneten Zugriffsregeln geändert wurden, oder legt diesen Wert fest. + true, wenn die diesem -Objekt zugeordneten Zugriffsregeln geändert wurden, andernfalls false. + + + Ruft den des Objekts ab, dem die Zugriffsregeln dieses -Objekts zugeordnet sind.Das -Objekt muss ein Objekt sein, das in ein -Objekt umgewandelt werden kann. + Der Typ des Objekts, dem die Zugriffsregeln dieses -Objekts zugeordnet sind. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordneten Zugriffsregeln in kanonischer Reihenfolge vorliegen. + true, wenn die Zugriffsregeln in kanonischer Reihenfolge vorliegen, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob die freigegebene Zugriffssteuerungsliste (DACL – Discretionary Access Control List), die diesem -Objekt zugeordnet ist, geschützt ist. + true, wenn die DACL geschützt ist, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordneten Überwachungsregeln in kanonischer Reihenfolge vorliegen. + true, wenn die Überwachungsregeln in kanonischer Reihenfolge vorliegen, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob die Systemzugriffssteuerungsliste (SACL – System Access Control List), die diesem -Objekt zugeordnet ist, geschützt ist. + true, wenn die SACL geschützt ist, andernfalls false. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + Das von dieser Methode erstellte -Objekt. + Die Identität, auf die die Überwachungsregel angewendet wird.Dabei muss es sich um ein Objekt handeln, das in eine umgewandelt werden kann. + Die Zugriffsmaske dieser Regel.Die Zugriffsmaske ist eine 32-Bit-Auflistung anonymer Bits, deren Bedeutung von den einzelnen Integratoren definiert wird. + true, wenn diese Regel von einem übergeordneten Container geerbt wird. + Gibt die Vererbungseigenschaften der Überwachungsregel an. + Gibt an, ob geerbte Überwachungsregeln automatisch weitergegeben werden.Die Weitergabeflags werden ignoriert, wenn auf festgelegt ist. + Gibt die Bedingungen an, für die die Regel überwacht wird. + + + Ruft einen booleschen Wert ab, der angibt, ob die diesem -Objekt zugeordneten Überwachungsregeln geändert wurden, oder legt diesen Wert fest. + true, wenn die diesem -Objekt zugeordneten Überwachungsregeln geändert wurden, andernfalls false. + + + Ruft das -Objekt ab, dem die Überwachungsregeln dieses -Objekts zugeordnet sind.Das -Objekt muss ein Objekt sein, das in ein -Objekt umgewandelt werden kann. + Der Typ des Objekts, dem die Überwachungsregeln dieses -Objekts zugeordnet sind. + + + Ruft die primäre Gruppe ab, die dem angegebenen Besitzer zugeordnet ist. + Die primäre Gruppe, die dem angegebenen Besitzer zugeordnet ist. + Der Besitzer, für den die primäre Gruppe abgerufen werden soll. + + + + + + Ruft den Benutzer ab, der der angegebenen primären Gruppe zugeordnet ist. + Der Benutzer mit der angegebenen Gruppe. + Die primäre Gruppe, für die der Benutzer abgerufen werden soll. + + + + + + Gibt ein Array von Bytewerten zurück, das die Sicherheitsbeschreibungsinformationen für dieses -Objekt darstellt. + Ein Array von Bytewerten, das die Sicherheitsbeschreibung für dieses -Objekt darstellt.Diese Methode gibt null zurück, wenn dieses -Objekt keine Sicherheitsinformationen enthält. + + + Gibt die SDDL-Darstellung (Security Descriptor Definition Language) der angegebenen Abschnitte der von diesem -Objekt dargestellten Sicherheitsbeschreibung zurück. + Die SDDL-Darstellung der angegebenen Abschnitte der Sicherheitsbeschreibung, die diesem -Objekt zugeordnet ist. + Gibt an, welche Abschnitte (Zugriffsregeln, Überwachungsregeln, primäre Gruppe, Besitzer) der Sicherheitsbeschreibung abgerufen werden sollen. + + + Ruft einen booleschen Wert ab, der angibt, ob die dem sicherungsfähigen Objekt zugeordnete Gruppe geändert wurde, oder legt diesen fest. + true, wenn die dem sicherungsfähigen Objekt zugeordnete Gruppe geändert wurde, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob dieses -Objekt ein Containerobjekt ist. + true, wenn das -Objekt ein Containerobjekt ist, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob dieses -Objekt ein Verzeichnisobjekt ist. + true, wenn das -Objekt ein Verzeichnisobjekt ist, andernfalls false. + + + Gibt einen booleschen Wert zurück, der angibt, ob die diesem -Objekt zugeordnete Sicherheitsbeschreibung in das SDDL (Security Descriptor Definition Language)-Format umgewandelt werden kann. + true, wenn die diesem -Objekt zugeordnete Sicherheitsbeschreibung in das SDDL-Format (Security Descriptor Definition Language) umgewandelt werden kann, andernfalls false. + + + Wendet die angegebene Änderung auf die freigegebene Zugriffssteuerungsliste (DACL – Discretionary Access Control List) an, die diesem -Objekt zugeordnet ist. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die DACL angewendet werden soll. + Die zu ändernde Zugriffsregel. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + + + Wendet die angegebene Änderung auf die freigegebene Zugriffssteuerungsliste (DACL – Discretionary Access Control List) an, die diesem -Objekt zugeordnet ist. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die DACL angewendet werden soll. + Die zu ändernde Zugriffsregel. + true, wenn die DACL erfolgreich geändert wird, andernfalls false. + + + Wendet die angegebene Änderung auf die Systemzugriffssteuerungsliste (SACL – System Access Control List) an, die diesem -Objekt zugeordnet ist. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die SACL angewendet werden soll. + Die zu ändernde Überwachungsregel. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + + + Wendet die angegebene Änderung auf die Systemzugriffssteuerungsliste (SACL – System Access Control List) an, die diesem -Objekt zugeordnet ist. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + Die Änderung, die auf die SACL angewendet werden soll. + Die zu ändernde Überwachungsregel. + true, wenn die SACL erfolgreich geändert wird, andernfalls false. + + + Ruft einen booleschen Wert ab, der angibt, ob der Besitzer des sicherungsfähigen Objekts geändert wurde, oder legt diesen Wert fest. + true, wenn der Besitzer des sicherungsfähigen Objekts geändert wurde, andernfalls false. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + true, um das Recht zu aktivieren, das dem Aufrufer ermöglicht, den Besitz des Objekts zu übernehmen. + Der Name, der zum Abrufen der dauerhaft gespeicherten Informationen verwendet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Das Handle, das zum Abrufen der dauerhaft gespeicherten Informationen verwendet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + + + Führt eine dauerhafte Speicherung der angegebenen Abschnitte der Sicherheitsbeschreibung aus, die diesem -Objekt zugeordnet sind.Es wird empfohlen, dass die Werte der -Parameter, die an den Konstruktor übergeben werden, und die Persist-Methoden identisch sind.Weitere Informationen finden Sie in den Hinweisen. + Der Name, der zum Abrufen der dauerhaft gespeicherten Informationen verwendet wird. + Einer der -Enumerationswerte, der die Abschnitte der Sicherheitsbeschreibung (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) des sicherungsfähigen Objekts angibt, die gespeichert werden sollen. + + + Entfernt alle der angegebenen zugeordneten Zugriffsregeln. + Die , für die alle Zugriffsregeln entfernt werden sollen. + Die Zugriffsregeln liegen nicht in kanonischer Reihenfolge vor. + + + Entfernt alle der angegebenen zugeordneten Überwachungsregeln. + Die , für die alle Überwachungsregeln entfernt werden sollen. + Die Überwachungsregeln liegen nicht in kanonischer Reihenfolge vor. + + + Sperrt dieses -Objekt für Lesezugriff. + + + Entsperrt dieses -Objekt für Lesezugriff. + + + Legt den Schutz der Zugriffsregeln fest, die diesem -Objekt zugeordnet sind, oder entfernt diesen.Geschützte Zugriffsregeln können von übergeordneten Objekten nicht durch Vererbung geändert werden. + true, wenn die diesem -Objekt zugeordneten Zugriffsregeln vor Vererbung geschützt werden sollen, false, wenn Vererbung zugelassen werden soll. + true, wenn geerbte Zugriffsregeln beibehalten werden sollen, false wenn geerbte Zugriffsregeln entfernt werden sollen.Dieser Parameter wird ignoriert, wenn false ist. + Diese Methode versucht, geerbte Regeln aus einer nicht kanonischen freigegebenen Zugriffssteuerungsliste (DACL – Discretionary Access Control List) zu entfernen. + + + Legt den Schutz der Überwachungsregeln fest, die diesem -Objekt zugeordnet sind, oder entfernt diesen.Geschützte Überwachungsregeln können von übergeordneten Objekten nicht durch Vererbung geändert werden. + true, wenn die diesem -Objekt zugeordneten Überwachungsregeln vor Vererbung geschützt werden sollen, false, wenn Vererbung zugelassen werden soll. + true, wenn geerbte Überwachungsregeln beibehalten werden sollen, false wenn geerbte Überwachungsregeln entfernt werden sollen.Dieser Parameter wird ignoriert, wenn false ist. + Diese Methode versucht, geerbte Regeln aus einer nicht kanonischen Systemzugriffssteuerungsliste (SACL – System Access Control List) zu entfernen. + + + Legt die primäre Gruppe für die Sicherheitsbeschreibung fest, die diesem -Objekt zugeordnet ist. + Die festzulegende primäre Gruppe. + + + Legt den Besitzer der Sicherheitsbeschreibung fest, die diesem -Objekt zugeordnet ist. + Der festzulegende Besitzer. + + + Legt die Sicherheitsbeschreibung für dieses -Objekt durch das angegebene Array von Bytewerten fest. + Das Array von Bytes, das zum Festlegen der Sicherheitsbeschreibung verwendet wird. + + + Legt die angegebenen Abschnitte der Sicherheitsbeschreibung für dieses -Objekt durch das angegebene Array von Bytewerten fest. + Das Array von Bytes, das zum Festlegen der Sicherheitsbeschreibung verwendet wird. + Die Abschnitte (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) der festzulegenden Sicherheitsbeschreibung. + + + Legt die Sicherheitsbeschreibung für dieses -Objekt durch die angegebene SDDL-Zeichenfolge (Security Descriptor Definition Language) fest. + Die SDDL-Zeichenfolge, durch die die Sicherheitsbeschreibung festgelegt wird. + + + Legt die angegebenen Abschnitte der Sicherheitsbeschreibung für dieses -Objekt durch die angegebene SDDL-Zeichenfolge (Security Descriptor Definition Language) fest. + Die SDDL-Zeichenfolge, durch die die Sicherheitsbeschreibung festgelegt wird. + Die Abschnitte (Zugriffsregeln, Überwachungsregeln, Besitzer, primäre Gruppe) der festzulegenden Sicherheitsbeschreibung. + + + Sperrt dieses -Objekt für den Schreibzugriff. + + + Entsperrt dieses -Objekt für Schreibzugriff. + + + Stellt die Möglichkeit bereit, Zugriff auf Objekte ohne direkte Bearbeitung von Zugriffssteuerungslisten (ACLs) zu steuern, gewährt außerdem die Möglichkeit zur Typumwandlung von Zugriffsrechten. + Die Zugriffsrechte für das Objekt. + + + Initialisiert eine neue Instanz der ObjectSecurity’1-Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Ressourcentyp. + + + Initialisiert eine neue Instanz der ObjectSecurity’1-Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Ressourcentyp. + Ein Handler. + Die einzuschließenden Abschnitte. + + + Initialisiert eine neue Instanz der ObjectSecurity’1-Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Ressourcentyp. + Ein Handler. + Die einzuschließenden Abschnitte. + Ein von Integratoren implementierter Delegat, der benutzerdefinierte Ausnahmen bereitstellt. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Initialisiert eine neue Instanz der ObjectSecurity’1-Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Ressourcentyp. + Der Name des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Die einzuschließenden Abschnitte. + + + Initialisiert eine neue Instanz der ObjectSecurity’1-Klasse. + true, wenn das neue -Objekt ein Containerobjekt ist. + Der Ressourcentyp. + Der Name des sicherungsfähigen Objekts, dem das neue -Objekt zugeordnet wird. + Die einzuschließenden Abschnitte. + Ein von Integratoren implementierter Delegat, der benutzerdefinierte Ausnahmen bereitstellt. + Ein Objekt, das Kontextinformationen über die Quelle oder das Ziel der Ausnahme bereitstellt. + + + Ruft den Typ des sicherungsfähigen Objekts ab, das diesem ObjectSecurity’1-Objekt zugeordnet ist. + Das Typ des sicherungsfähigen Objekts, das der aktuellen Instanz zugeordnet ist. + + + Initialisiert eine neue Instanz der ObjectAccessRule-Klasse, die eine neue Zugriffssteuerungsregel für das zugeordnete Sicherheitsobjekt darstellt. + Stellt eine neue Zugriffssteuerungsregel für den angegebenen Benutzer mit den angegebenen Zugriffsrechten und Flags sowie der angegebenen Zugriffssteuerung dar. + Stellt ein Benutzerkonto dar. + Der Zugriffs-Typ + true, wenn die Zugriffsregel geerbt wurde, andernfalls false. + Gibt an, wie Zugriffsmasken zu untergeordneten Objekten weitergegeben werden. + Gibt an, wie Einträge für die Zugriffssteuerung (ACEs) an untergeordnete Objekte weitergegeben werden. + Gibt an, ob der Zugriff gewährt oder verweigert wird. + + + Ruft den Typ des Objekts ab, dem die Zugriffsregeln dieses ObjectSecurity’1-Objekts zugeordnet sind. + Der Typ des Objekts, das den Zugriffsregeln des aktuellen Instanz zugeordnet ist. + + + Fügt der DACL (Discretionary Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist, die angegebene Zugriffsregel hinzu. + Die hinzuzufügende Regel + + + Fügt der SACL (System Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist, die angegebene Überwachungsregel hinzu. + Die hinzuzufügende Überwachungsregel. + + + Initialisiert eine neue Instanz der -Klasse, die die angegebene Überwachungsregel für den angegebenen Benutzer darstellt. + Gibt die angegebene Überwachungsregel für den angegebenen Benutzer zurück. + Stellt ein Benutzerkonto dar. + Eine ganze Zahl, die einen Zugriffstyp angibt. + true, wenn die Zugriffsregel geerbt wurde, andernfalls false. + Gibt an, wie Zugriffsmasken zu untergeordneten Objekten weitergegeben werden. + Gibt an, wie Einträge für die Zugriffssteuerung (ACEs) an untergeordnete Objekte weitergegeben werden. + Beschreibt den Typ der durchzuführenden Überwachung,. + + + Ruft den Typ des Objekts ab, dem die Überwachungsregeln dieses ObjectSecurity’1-Objekts zugeordnet sind. + Das Typ-Objekt, das den Überwachungsregeln des aktuellen Instanz zugeordnet ist. + + + Führt mithilfe des angegebenen Handels eine dauerhafte Speicherung der Sicherheitsbeschreibung aus, die diesem ObjectSecurity`1-Objekt zugeordnet sind. + Das Handle des sicherungsfähigen Objekts, dem das ObjectSecurity`1-Objekt zugeordnet wird. + + + Führt mithilfe des angegebenen Namens eine dauerhafte Speicherung der Sicherheitsbeschreibung aus, die diesem ObjectSecurity`1-Objekt zugeordnet sind. + Der Name des sicherungsfähigen Objekts, dem das ObjectSecurity`1-Objekt zugeordnet wird. + + + Entfernt Zugriffsregeln, die dieselbe Sicherheits-ID und dieselbe Zugriffsmaske wie die angegebene Zugriffsregel enthalten, aus der DACL (Discretionary Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Gibt true zurück, wenn die Zugriffsregel erfolgreich entfernt wurde; andernfalls false. + Die zu entfernende Regel. + + + Entfernt alle Zugriffsregeln, die dieselbe Sicherheits-ID wie die angegebene Zugriffsregel enthalten, aus der DACL (Discretionary Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Die zu entfernende Zugriffsregel. + + + Entfernt alle Zugriffsregeln, die der angegebenen Zugriffsregel genau entsprechen, aus der DACL (Discretionary Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Die zu entfernende Zugriffsregel. + + + Entfernt Überwachungsregeln, die dieselbe Sicherheits-ID und dieselbe Zugriffsmaske wie die angegebene Überwachungsregel enthalten, aus der SACL (System Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Gibt true zurück, wenn das Objekt entfernt wurde, andernfalls false. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Überwachungsregeln, die dieselbe Sicherheits-ID wie die angegebene Überwachungsregel enthalten, aus der SACL (System Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Überwachungsregeln, die der angegebenen Überwachungsregel genau entsprechen, aus der SACL (System Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet ist. + Die zu entfernende Überwachungsregel. + + + Entfernt alle Zugriffsregeln in der DACL (Discretionary Access Control List), die diesem ObjectSecurity`1-Objekt zugeordnet sind und fügt die festgelegte Zugriffsregel hinzu. + Die zurückzusetzende Zugriffsregel. + + + Entfernt alle Zugriffsregeln, die dieselbe Sicherheits-ID und denselben Qualifizierer wie die angegebene Zugriffsregel in der DACL (Discretionary Access Control List) enthalten, die diesem ObjectSecurity`1-Objekt zugeordnet ist, und fügt anschließend die angegebene Zugriffsregel hinzu. + Die festzulegende Zugriffsregel. + + + Entfernt alle Überwachungsregeln, die dieselbe Sicherheits-ID und denselben Qualifizierer wie die angegebene Überwachungsregel in der SACL (System Access Control List) enthalten, die diesem ObjectSecurity`1-Objekt zugeordnet ist, und fügt anschließend die angegebene Überwachungsregel hinzu. + Die festzulegende Überwachungsregel. + + + Diese Ausnahme wird ausgelöst, wenn eine Methode in dem -Namespace versucht, eine für diese Methode nicht verfügbare Berechtigung zu aktivieren. + + + Initialisiert eine neue Instanz der -Klasse. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Berechtigung. + Die nicht aktivierte Berechtigung. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Ausnahme. + Die nicht aktivierte Berechtigung. + Die Ausnahme, die die Ursache der aktuellen Ausnahme ist.Wenn der -Parameter kein NULL-Verweis ist, (Nothing in Visual Basic), wird die aktuelle Ausnahme in einem catch-Block ausgelöst, der die innere Ausnahme behandelt. + + + Ruft den Namen der nicht aktivierten Berechtigung ab. + Der Name der Berechtigung, die von der Methode nicht aktiviert werden konnte. + + + Gibt an, wie Einträge für die Zugriffssteuerung (ACEs) an untergeordnete Objekte weitergegeben werden. Diese Flags sind nur von Bedeutung, wenn Vererbungsflags vorhanden sind. + + + Gibt an, dass der ACE nur an untergeordnete Objekte weitergegeben wird.Dies schließt untergeordnete Container- und Endobjekte ein. + + + Gibt an, dass keine Vererbungsflags festgelegt sind. + + + Gibt an, dass der ACE nicht an untergeordnete Objekte weitergegeben wird. + + + Stellt einen Zugriffssteuerungseintrag (ACE – Access Control Entry) dar, der einen Qualifizierer enthält.Der durch ein -Objekt dargestellte Qualifizierer gibt an, ob der ACE Zugriff gewährt bzw. verweigert oder ob er Systemüberwachungen oder einen Systemalarm auslöst.Die -Klasse ist die abstrakte Basisklasse der -Klasse und der -Klasse. + + + Ruft einen Wert ab, der angibt, ob der ACE Zugriff gewährt, Zugriff verweigert, Systemüberwachungen auslöst oder einen Systemalarm auslöst. + Ein Wert, der angibt, ob der ACE Zugriff gewährt, Zugriff verweigert, Systemüberwachungen auslöst oder einen Systemalarm auslöst. + + + Gibt die opaken Rückrufdaten zurück, die diesem -Objekt zugeordnet sind. + Ein Array von Bytewerten, das die opaken Rückrufdaten darstellt, die diesem -Objekt zugeordnet sind. + + + Gibt an, ob dieses -Objekt Rückrufdaten enthält. + true, wenn dieses -Objekt Rückrufdaten enthält, andernfalls false. + + + Ruft die Länge der opaken Rückrufdaten ab, die diesem -Objekt zugeordnet sind.Diese Eigenschaft ist nur für Zugriffssteuerungseinträge (ACEs) mit Rückruf gültig. + Die Länge der opaken Rückrufdaten. + + + Legt die opaken Rückrufdaten fest, die diesem -Objekt zugeordnet sind. + Ein Array von Bytewerten, das die opaken Rückrufdaten darstellt, die diesem -Objekt zugeordnet sind. + + + Stellt eine Access Control List (ACL – Zugriffssteuerungsliste) dar. + + + Initialisiert eine neue Instanz der -Klasse mit der angegebenen Revisionsebene. + Die Revisionsebene der neuen ACL. + Die Anzahl der möglichen ACEs, die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Initialisiert eine neue Instanz der -Klasse aus der angegebenen binären Form. + Ein Array von Bytewerten, das eine ACL darstellt. + Der Offset im -Parameter, ab dem das Rückgängigmachen des Marshalling von Daten beginnen soll. + + + Ruft die Länge der binären Darstellung des aktuellen -Objekts in Bytes ab.Diese Länge muss verwendet werden, bevor die ACL mithilfe der -Methode in ein binäres Array gemarshallt wird. + Die Länge der binären Darstellung des aktuellen -Objekts in Bytes. + + + Ruft die Anzahl der ACEs im aktuellen -Objekt ab. + Die Anzahl der ACEs im aktuellen -Objekt. + + + Marshallt den Inhalt des -Objekts in das angegebene Bytearray, wobei beim angegebenen Offset begonnen wird. + Das Bytearray, in das der Inhalt von gemarshallt wird. + Der Offset, bei dem das Marshallen begonnen werden soll. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Fügt den angegebenen ACE am angegebenen Index ein. + Die Position, an der der neue ACE eingefügt werden soll.Geben Sie den Wert der -Eigenschaft an, wenn ein ACE am Ende des -Objekts eingefügt werden soll. + Der einzufügende ACE. + + ist negativ oder zu hoch, um den gesamten in zu kopieren. + + + Ruft den ACE am angegebenen Index ab oder legt diesen fest. + Der ACE am angegebenen Index. + Der nullbasierte Index des ACE, der abgerufen oder festgelegt werden soll. + + + Entfernt den ACE von der angegebenen Position. + Der nullbasierte Index des zu entfernenden ACE. + Der Wert des -Parameters ist größer als der Wert -Eigenschaft minus 1, oder er ist negativ. + + + Ruft die Revisionsebene von ab. + Ein Bytewert, der die Revisionsebene von angibt. + + + Stellt eine Sicherheitsbeschreibung dar.Zu einer Sicherheitsbeschreibung gehören ein Besitzer, eine primäre Gruppe, eine DACL und eine SACL. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen Arrays von Bytewerten. + Das Array von Bytewerten, aus dem das neue -Objekt erstellt werden soll. + Der Offset im -Array, bei dem mit dem Kopieren begonnen werden soll. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + Flags, die das Verhalten des neuen -Objekts angeben. + Der Besitzer des neuen -Objekts. + Die primäre Gruppe für das neue -Objekt. + Die SACL für das neue -Objekt. + Die DACL (Discretionary Access Control List, freigegebene Zugriffssteuerungsliste) für das neue -Objekt. + + + Initialisiert eine neue Instanz der -Klasse mit der angegebenen SDDL-Zeichenfolge (Security Descriptor Definition Language). + Die SDDL-Zeichenfolge, aus der das neue -Objekt erstellt werden soll. + + + Ruft Werte ab, die das Verhalten des -Objekts angeben. + Mindestens ein Wert der -Enumeration, kombiniert mit einem logischen Operator OR. + + + Ruft die DACL für dieses -Objekt ab oder legt diese fest.Die DACL enthält Zugriffsregeln. + Die DACL für dieses -Objekt. + + + Ruft die primäre Gruppe für dieses -Objekt ab oder legt diese fest. + Die primäre Gruppe für dieses -Objekt. + + + Ruft den Besitzer des Objekts ab, dem dieses -Objekt zugeordnet ist, oder legt diesen fest. + Der Besitzer des Objekts, dem dieses -Objekt zugeordnet ist. + + + Ruft einen Bytewert ab, der die Steuerelementbits des Ressourcen-Managers darstellt, die diesem -Objekt zugeordnet sind, oder legt diesen fest. + Ein Bytewert, der die Steuerelementbits des Ressourcen-Managers darstellt, die diesem -Objekt zugeordnet sind. + + + Legt die -Eigenschaft dieses -Objekts auf den angegebenen Wert fest. + Mindestens ein Wert der -Enumeration, kombiniert mit einem logischen Operator OR. + + + Ruft die SACL (System Access Control List, Systemzugriffssteuerungsliste) für dieses -Objekt ab oder legt diese fest.Die SACL enthält Überwachungsregeln. + Die SACL für dieses -Objekt. + + + Gibt die definierten systemeigenen Objekttypen an. + + + Ein Verzeichnisdienstobjekt (DS – Directory Service), ein Eigenschaftensatz oder eine einzelne Eigenschaft eines Verzeichnisdienstobjekts. + + + Ein Verzeichnisdienstobjekt und alle seine Eigenschaftensätze und Eigenschaften. + + + Eine Datei oder ein Verzeichnis. + + + Ein lokales Kernelobjekt. + + + Eine Netzwerkfreigabe. + + + Ein Drucker. + + + Ein von einem Anbieter definiertes Objekt. + + + Ein Registrierungsschlüssel. + + + Ein Objekt für einen Registrierungseintrag unter WOW64. + + + Ein Windows-Dienst. + + + Ein unbekannter Objekttyp. + + + Ein Arbeitsstations- oder ein Desktopobjekt auf dem lokalen Computer. + + + Ein Windows-Verwaltungsinstrumentationsobjekt (WMI). + + + Gibt den Abschnitt einer Sicherheitsbeschreibung an, die abgefragt oder festgelegt werden soll. + + + Gibt die DACL (Discretionary Access Control List) an. + + + Gibt den primären Gruppenbezeichner an. + + + Gibt den Besitzerbezeichner an. + + + Gibt die SACL (System Access Control List) an. + + + Stellt eine Systemzugriffssteuerungsliste (SACL – System Access Control List) dar. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Die Revisionsebene des neuen -Objekts. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Die Anzahl der möglichen Zugriffssteuerungseinträge (ACEs – Access Control Entries), die dieses -Objekt enthalten kann.Diese Zahl sollte nur als Anhaltspunkt verwendet werden. + + + Initialisiert eine neue Instanz der -Klasse mit den angegebenen Werten des angegebenen -Objekts. + true, wenn das neue -Objekt ein Container ist. + true, wenn das neue -Objekt eine Zugriffssteuerungsliste (ACL) für ein Verzeichnisobjekt ist. + Das zugrunde liegende -Objekt für das neue -Objekt.Geben Sie null an, um eine leere ACL zu erstellen. + + + Fügt dem aktuellen -Objekt eine Überwachungsregel hinzu. + Der Typ der hinzuzufügenden Überwachungsregel. + Der , für den eine Überwachungsregel hinzugefügt werden soll. + Die Zugriffsmaske für die neue Überwachungsregel. + Flags, die die Vererbungseigenschaften der neuen Überwachungsregel angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für die neue Überwachungsregel angeben. + + + Fügt dem aktuellen -Objekt eine Überwachungsregel mit den angegebenen Einstellungen hinzu.Verwenden Sie diese Methode für Zugriffssteuerungslisten (ACLs) für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp für die neue Überwachungsregel angeben. + Der Typ der hinzuzufügenden Überwachungsregel. + Der , für den eine Überwachungsregel hinzugefügt werden soll. + Die Zugriffsmaske für die neue Überwachungsregel. + Flags, die die Vererbungseigenschaften der neuen Überwachungsregel angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für die neue Überwachungsregel angeben. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die die neue Überwachungsregel gilt. + Die Identität der Klasse von untergeordneten Objekten, die die neue Überwachungsregel erben können. + + + Fügt dem aktuellen -Objekt eine Überwachungsregel hinzu. + Der , für den eine Überwachungsregel hinzugefügt werden soll. + Die für die neue Überwachungsregel. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt. + true, wenn diese Methode die angegebene Überwachungsregel erfolgreich entfernt hat, andernfalls false. + Der Typ der zu entfernenden Überwachungsregel. + Der , für den eine Überwachungsregel entfernt werden soll. + Die Zugriffsmaske für die Regel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Regel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Regel angeben, die entfernt werden sollen. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp angeben. + true, wenn diese Methode die angegebene Überwachungsregel erfolgreich entfernt hat, andernfalls false. + Der Typ der zu entfernenden Überwachungsregel. + Der , für den eine Überwachungsregel entfernt werden soll. + Die Zugriffsmaske für die Regel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Regel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Regel angeben, die entfernt werden sollen. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die die entfernte Überwachungssteuerungsregel gilt. + Die Identität der Klasse von untergeordneten Objekten, die die entfernte Überwachungsregel erben können. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt. + true, wenn diese Methode die angegebene Überwachungsregel erfolgreich entfernt hat, andernfalls false. + Der , für den eine Überwachungsregel entfernt werden soll. + Der , für den eine Überwachungsregel entfernt werden soll. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt. + Der Typ der zu entfernenden Überwachungsregel. + Der , für den eine Überwachungsregel entfernt werden soll. + Die Zugriffsmaske für die Regel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Regel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Regel angeben, die entfernt werden sollen. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp angeben. + Der Typ der zu entfernenden Überwachungsregel. + Der , für den eine Überwachungsregel entfernt werden soll. + Die Zugriffsmaske für die Regel, die entfernt werden soll. + Flags, die die Vererbungseigenschaften der Regel angeben, die entfernt werden sollen. + Flags, die die Weitergabeeigenschaften der Vererbung für die Regel angeben, die entfernt werden sollen. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die die entfernte Überwachungssteuerungsregel gilt. + Die Identität der Klasse von untergeordneten Objekten, die die entfernte Überwachungsregel erben können. + + + Entfernt die angegebene Überwachungsregel aus dem aktuellen -Objekt. + Der , für den eine Überwachungsregel entfernt werden soll. + Die für die Regel entfernt werden soll. + + + Legt die angegebene Überwachungsregel für das angegebene -Objekt fest. + Die festzulegende Überwachungsbedingung. + Der , für den eine Überwachungsregel festgelegt werden soll. + Die Zugriffsmaske für die neue Überwachungsregel. + Flags, die die Vererbungseigenschaften der neuen Überwachungsregel angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für die neue Überwachungsregel angeben. + + + Legt die angegebene Überwachungsregel für das angegebene -Objekt fest.Verwenden Sie diese Methode für ACLs für Verzeichnisobjekte, wenn Sie den Objekttyp oder den geerbten Objekttyp angeben. + Die festzulegende Überwachungsbedingung. + Der , für den eine Überwachungsregel festgelegt werden soll. + Die Zugriffsmaske für die neue Überwachungsregel. + Flags, die die Vererbungseigenschaften der neuen Überwachungsregel angeben. + Flags, die die Weitergabeeigenschaften der Vererbung für die neue Überwachungsregel angeben. + Flags, die angeben, ob der -Parameter und der -Parameter Nicht-null-Werte enthalten. + Die Identität der Klasse von Objekten, für die die neue Überwachungsregel gilt. + Die Identität der Klasse von untergeordneten Objekten, die die neue Überwachungsregel erben können. + + + Legt die angegebene Überwachungsregel für das angegebene -Objekt fest. + Der , für den eine Überwachungsregel festgelegt werden soll. + Der , für den eine Überwachungsregel festgelegt werden soll. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/es/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/es/System.Security.AccessControl.xml new file mode 100644 index 0000000..7a5795d --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/es/System.Security.AccessControl.xml @@ -0,0 +1,1949 @@ + + + + System.Security.AccessControl + + + + Especifica las acciones permitidas para objetos que se pueden proteger. + + + Especifica acceso de sólo escritura. + + + No especifica ningún acceso. + + + Especifica acceso de sólo lectura. + + + Especifica el tipo de modificación del control de acceso que se va a realizar.Los métodos de la clase y sus descendientes utilizan esta enumeración. + + + Agregue la regla de autorización especificada a la lista de control de acceso (ACL). + + + Quita de la ACL las reglas de autorización que contienen el mismo identificador de seguridad (SID) y la misma máscara de acceso que la regla de autorización especificada. + + + Quita de la ACL las reglas de autorización que contienen el mismo SID que la regla de autorización especificada. + + + Quita de la ACL las reglas de autorización que coinciden exactamente con la regla de autorización especificada. + + + Quita de la ACL las reglas de autorización que contienen el mismo SID que la regla de autorización especificada y, a continuación, agrega a la ACL la regla de autorización especificada. + + + Quita de la ACL todas las reglas de autorización, a continuación agrega a la ACL la regla de autorización especificada. + + + Especifica las secciones de un descriptor de seguridad que se van a guardar o cargar. + + + Lista de control de acceso discrecional (DACL, Discretionary Access Control List). + + + Todo el descriptor de seguridad. + + + Lista de control de acceso al sistema (SACL, System Access Control List). + + + Grupo principal. + + + Sin secciones. + + + Propietario. + + + Especifica si un objeto se utiliza para permitir o para denegar el acceso.Estos valores no son marcadores y no se pueden combinar. + + + El objeto se utiliza para permitir el acceso a un objeto protegido. + + + El objeto se utiliza para denegar el acceso a un objeto protegido. + + + Representa una combinación de la identidad de un usuario, una máscara de acceso y un tipo de control de acceso (conceder o denegar).Un objeto también contiene información sobre cómo los objetos secundarios heredan la regla y cómo se propaga esa herencia. + + + Inicializa una nueva instancia de la clase utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso.Este parámetro debe ser un objeto que permita su conversión al tipo . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true si esta regla se hereda de un contenedor primario. + Las propiedades de herencia de la regla de acceso. + Indica si las reglas de acceso heredadas se propagan automáticamente.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + El tipo de control de acceso válido. + El valor del parámetro no puede convertirse en un objeto o el parámetro contiene un valor que no es válido. + El valor del parámetro es cero o los parámetros o contienen valores de marcador no reconocidos. + + + Obtiene el valor de asociado a este objeto . + Valor de asociado a este objeto . + + + Representa una combinación de la identidad de un usuario, una máscara de acceso y un tipo de control de acceso (conceder o denegar).Un objeto AccessRule`1 de regla de acceso también contiene información sobre cómo los objetos secundarios heredan la regla y cómo se propaga esa herencia. + Tipo de derechos de acceso para la regla de acceso. + + + Inicializa una nueva instancia de la clase AccessRule’1 utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso. + Derechos de regla de acceso. + El tipo de control de acceso válido. + + + Inicializa una nueva instancia de la clase AccessRule’1 utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso. + Derechos de regla de acceso. + Las propiedades de herencia de la regla de acceso. + Indica si las reglas de acceso heredadas se propagan automáticamente.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + El tipo de control de acceso válido. + + + Inicializa una nueva instancia de la clase AccessRule’1 utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso. + Derechos de regla de acceso. + El tipo de control de acceso válido. + + + Inicializa una nueva instancia de la clase AccessRule’1 utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso. + Derechos de regla de acceso. + Las propiedades de herencia de la regla de acceso. + Indica si las reglas de acceso heredadas se propagan automáticamente.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + El tipo de control de acceso válido. + + + Obtiene los derechos de la instancia actual. + Los derechos, convertidos en tipo <T>, de la instancia actual. + + + Proporciona la capacidad para recorrer en iteración las entradas de control de acceso (ACE) de una lista de control de acceso (ACL). + + + Obtiene el elemento actual de la colección .Esta propiedad obtiene la versión descriptiva de tipo del objeto. + Elemento actual de la colección . + + + Desplaza el enumerador al siguiente elemento de la colección . + true si el enumerador avanzó con éxito hasta el siguiente elemento; false si el enumerador alcanzó el final de la colección. + La colección se modificó después de crear el enumerador. + + + Establece el enumerador en su posición inicial, que es antes del primer elemento de la colección . + La colección se modificó después de crear el enumerador. + + + + Especifica la herencia y el comportamiento de la auditoría de una entrada de control de acceso (ACE). + + + Se auditan todos los intentos de acceso. + + + La máscara de acceso se propaga a los objetos de contenedor secundarios. + + + Se auditan los intentos de acceso con error. + + + Operación OR lógica de , , y . + + + Se hereda una ACE de un contenedor primario en lugar de establecerse explícitamente para un objeto. + + + La máscara de acceso sólo se propaga a los objetos secundarios.donde se incluyen tanto el contenedor como los objetos hoja secundarios. + + + No se establecen marcadores ACE. + + + Las comprobaciones de acceso no se aplican al objeto; sólo se aplican a sus elementos secundarios. + + + La máscara de acceso se propaga a los objetos hoja secundarios. + + + Se auditan los intentos de acceso con éxito. + + + Especifica la función de una entrada de control de acceso (ACE). + + + Permita el acceso. + + + Deniegue el acceso. + + + Provoque una alarma del sistema. + + + Provoque una auditoría del sistema. + + + Define los tipos de entrada de control de acceso (ACE) disponibles. + + + Concede el acceso a un objeto para un administrador de confianza concreto identificado por un objeto . + + + Concede el acceso a un objeto para un administrador de confianza concreto identificado por un objeto .Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Concede el acceso a un objeto, un conjunto de propiedades o una propiedad.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto y un objeto que identifica el administrador de confianza a quien el sistema concederá el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios.Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Se define pero nunca se utiliza.Se incluye aquí para integridad. + + + Concede el acceso a un objeto, un conjunto de propiedades o una propiedad.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto y un objeto que identifica el administrador de confianza a quien el sistema concederá el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios. + + + Deniega el acceso a un objeto para un administrador de confianza concreto identificado por un objeto . + + + Deniega el acceso a un objeto para un administrador de confianza concreto identificado por un objeto .Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Deniega el acceso a un objeto, un conjunto de propiedades o una propiedad.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto y un objeto que identifica el administrador de confianza a quien el sistema concederá el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios.Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Deniega el acceso a un objeto, un conjunto de propiedades o una propiedad.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto y un objeto que identifica el administrador de confianza a quien el sistema concederá el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios. + + + Efectúa el seguimiento del tipo de ACE definido máximo de la enumeración. + + + Reservado para un uso futuro. + + + Reservado para un uso futuro. + + + Reservado para un uso futuro. + + + Reservado para un uso futuro. + + + Produce un mensaje de auditoría que se va a registrar cuando un administrador de confianza especificado intenta obtener acceso a un objeto.Un objeto identifica el administrador de confianza. + + + Produce un mensaje de auditoría que se va a registrar cuando un administrador de confianza especificado intenta obtener acceso a un objeto.Un objeto identifica el administrador de confianza.Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Produce un mensaje de auditoría que se va a registrar cuando un administrador de confianza especificado intenta obtener acceso a un objeto o subobjetos como conjuntos de propiedades o propiedades.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto o subobjeto y un objeto que identifica el administrador de confianza a quien el sistema auditará el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios.Este tipo de ACE puede contener los datos de devolución de llamada opcionales.Los datos de devolución de llamada son objetos BLOB específicos del administrador de recursos que no se interpretan. + + + Produce un mensaje de auditoría que se va a registrar cuando un administrador de confianza especificado intenta obtener acceso a un objeto o subobjetos como conjuntos de propiedades o propiedades.La ACE contiene un conjunto de derechos de acceso, un GUID que identifica el tipo de objeto o subobjeto y un objeto que identifica el administrador de confianza a quien el sistema auditará el acceso.La ACE también contiene un GUID y un conjunto de marcadores que controlan la herencia de la ACE mediante objetos secundarios. + + + Especifica las condiciones de auditoría de los intentos de acceso a un objeto asegurable. + + + Se van a auditar los intentos incorrectos de acceso. + + + No se van a auditar los intentos incorrectos de acceso. + + + Se van a auditar los intentos correctos de acceso. + + + Representa una combinación de la identidad de un usuario y una máscara de acceso.Un objeto también contiene información sobre cómo los objetos secundarios heredan la regla, cómo se propaga la herencia y para qué condiciones se audita. + + + Inicializa una nueva instancia de la clase utilizando los valores especificados. + La identidad a la que se aplica la regla de auditoría.Debe ser un objeto que pueda convertirse en un objeto . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true para heredar esta regla de un contenedor primario. + Propiedades de herencia de la regla de auditoría. + Determina si se propagan automáticamente las reglas de auditoría heredadas.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + Condiciones para las que se audita la regla. + El valor del parámetro no se puede convertir al tipo o el parámetro contiene un valor no válido. + El valor del parámetro es cero o los parámetros o contienen valores de marcador no reconocidos. + + + Obtiene los marcadores de auditoría para esta regla de auditoría. + Combinación bit a bit de los valores de la enumeración.Esta combinación especifica las condiciones de auditoría para esta regla de auditoría. + + + Representa una combinación de la identidad de un usuario y una máscara de acceso. + + + + Inicializa una nueva instancia de la clase AuditRule’1 utilizando los valores especificados. + La identidad a la que se aplica esta regla de auditoría. + Derechos de la regla de auditoría. + Condiciones para las que se audita la regla. + + + Inicializa una nueva instancia de la clase AuditRule’1 utilizando los valores especificados. + La identidad a la que se aplica la regla de auditoría. + Derechos de la regla de auditoría. + Propiedades de herencia de la regla de auditoría. + Determina si se propagan automáticamente las reglas de auditoría heredadas. + Condiciones para las que se audita la regla. + + + Inicializa una nueva instancia de la clase AuditRule’1 utilizando los valores especificados. + La identidad a la que se aplica la regla de auditoría. + Derechos de la regla de auditoría. + Propiedades de la regla de auditoría. + + + Inicializa una nueva instancia de la clase AuditRule’1 utilizando los valores especificados. + La identidad a la que se aplica la regla de auditoría. + Derechos de la regla de auditoría. + Propiedades de herencia de la regla de auditoría. + Determina si se propagan automáticamente las reglas de auditoría heredadas. + Condiciones para las que se audita la regla. + + + Derechos de la regla de auditoría. + Devuelve . + + + Determina el acceso a los objetos que se pueden proteger.Las clases derivadas y proporcionan especializaciones para la funcionalidad de acceso y auditoría. + + + Inicializa una nueva instancia de la clase utilizando los valores especificados. + Identidad a la que se aplica la regla de acceso. Este parámetro debe ser un objeto que permita su conversión al tipo . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true para heredar esta regla de un contenedor primario. + Las propiedades de herencia de la regla de acceso. + Indica si las reglas de acceso heredadas se propagan automáticamente.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + El valor del parámetro no se puede convertir al tipo . + El valor del parámetro es cero o los parámetros o contienen valores de marcador no reconocidos. + + + Obtiene la máscara de acceso para esta regla. + Máscara de acceso para esta regla. + + + Obtiene la identidad a la que se aplica esta regla. + La identidad a la que se aplica esta regla. + + + Obtiene el valor de marcadores que determinan cómo heredan esta regla los objetos secundarios. + Combinación bit a bit de los valores de la enumeración. + + + Obtiene un valor que indica si esta regla se establece explícitamente o si se hereda de un objeto contenedor primario. + Es true si esta regla no se establece explícitamente pero en cambio se hereda de un contenedor primario. + + + Obtiene el valor de los marcadores de propagación que determinan cómo se propaga la herencia de esta regla a los objetos secundarios.Esta propiedad sólo es significativa cuando el valor de la enumeración no es . + Combinación bit a bit de los valores de la enumeración. + + + Representa una colección de objetos . + + + Inicializa una nueva instancia de la clase . + + + Agrega un objeto a la colección. + Objeto que se va a agregar a la colección. + + + Copia el contenido de la colección en una matriz. + Matriz en la que se copia el contenido de la colección. + Índice de base cero desde el que se empieza a copiar. + + + + Obtiene el objeto en el índice especificado de la colección. + El objeto correspondiente al índice especificado. + Índice de base cero del objeto que se va a obtener. + + + + + + + Representa una entrada de control de acceso (ACE). + + + Inicializa una nueva instancia de la clase . + Marcadores que especifican información sobre la herencia, la propagación de herencia y las condiciones de auditoría para la nueva entrada de control de acceso (ACE). + El uso de la nueva ACE. + La máscara de acceso para la ACE. + + asociado a la nueva ACE. + Es true para especificar que la nueva ACE es una ACE de tipo de devolución de llamada. + Los datos opacos asociados a la nueva ACE.Sólo se permiten los datos opacos para los tipos ACE de devolución de llamada. La longitud de esta matriz no debe ser mayor que el valor devuelto del método . + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Utilice esta longitud con el método antes de calcular las referencias de la ACL en una matriz binaria. + Longitud, en bytes, de la representación binaria del objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + La matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en la matriz . + + + Obtiene la máxima longitud permitida de un BLOB de datos opacos para entradas de control de acceso (ACE) de devolución de llamada. + La longitud permitida de un BLOB de datos opacos. + Es true para especificar que el objeto es un tipo de ACE de devolución de llamada. + + + Representa una lista de control de acceso (ACL) y es la clase base de las clases y . + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe usarse este valor de longitud antes de hacer el cálculo de referencias de la lista de control de acceso (ACL) en una matriz binaria mediante el método . + La longitud, en bytes, de la representación binaria del objeto actual. + + + Obtiene el número de entradas de control de acceso (ACE) del objeto actual. + Número de ACE del objeto actual. + + + Realiza el cálculo de referencias del objeto en la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + Matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + + Obtiene un valor booleano que especifica si las entradas de control de acceso (ACE) del objeto actual están en orden canónico. + Es true si las ACE del objeto actual están en orden canónico; en caso contrario, es false. + + + Establece si el objeto es un contenedor. + Es true si el objeto actual es un contenedor. + + + Establece si el objeto actual es una lista de control de acceso (ACL) de objetos de directorio. + Es true si el objeto actual es una ACL de objetos de directorio. + + + Obtiene o establece la clase en el índice especificado. + + en el índice especificado. + Índice de base cero de que se va a obtener o establecer. + + + Quita todas las entradas de control de acceso (ACE) contenidas en este objeto que están asociadas al objeto especificado. + Objeto que se va a comprobar. + + + Quita todas las entradas de control de acceso (ACE) heredadas de este objeto . + + + Obtiene el nivel de revisión del objeto . + Valor de tipo byte que indica el nivel de revisión del objeto . + + + Controla el acceso a los objetos sin manipulación directa de listas de control de acceso (ACL).Ésta es la clase base abstracta de la clase . + + + Inicializa una nueva instancia de la clase . + Es true si el nuevo objeto es un contenedor. + + + Agrega la regla de acceso especificada a la lista de control de acceso discrecional (DACL) asociada a este objeto . + La regla de acceso que se va a agregar. + + + Agrega la regla de auditoría especificada a la lista de control de acceso de sistema (SACL) asociada a este objeto . + La regla de auditoría que se va a agregar. + + + Obtiene una colección de las reglas de acceso asociadas al identificador de seguridad especificado. + La colección de reglas de acceso asociadas al objeto especificado. + Es true para incluir explícitamente reglas de acceso establecidas para el objeto. + Es true para incluir las reglas de acceso heredadas. + Especifica si el identificador de seguridad para el que se deben recuperar reglas de acceso es del tipo T:System.Security.Principal.SecurityIdentifier o T:System.Security.Principal.NTAccount.El valor de este parámetro debe ser un tipo que se pueda traducir al tipo . + + + + + + Obtiene una colección de las reglas de auditoría asociadas al identificador de seguridad especificado. + La colección de reglas de auditoría asociadas al objeto especificado. + Es true para incluir explícitamente reglas de auditoría establecidas para el objeto. + Es true para incluir las reglas de auditoría heredadas. + El identificador de seguridad para el que se van a recuperar las reglas de auditoría.Este debe ser un objeto que permita su conversión al tipo . + + + + + + Aplica la modificación especificada a la lista de control de acceso discrecional (DACL) asociada a este objeto . + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + La modificación que se va a aplicar a la DACL. + La regla de acceso que se va a modificar. + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + + + Aplica la modificación especificada a la lista de control de acceso de sistema (SACL) asociada a este objeto . + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + Modificación que se va a aplicar a la SACL. + La regla de auditoría que se va a modificar. + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + + + Quita las reglas de acceso que contienen el mismo identificador de seguridad y máscara de acceso que la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto . + true si la regla se quitó satisfactoriamente; en caso contrario, false. + La regla de acceso que se va a quitar. + + + Quita todas las reglas de acceso que tienen el mismo identificador de seguridad que la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto . + La regla de acceso que se va a quitar. + + + Quita todas las reglas de acceso que coinciden exactamente con la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto . + La regla de acceso que se va a quitar. + + + Quita las reglas de auditoría que contienen el mismo identificador de seguridad y máscara de acceso que la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto . + true si la regla de auditoría se quitó satisfactoriamente; en caso contrario, false. + La regla de auditoría que se va a quitar. + + + Quita todas las reglas de auditoría que tienen el mismo identificador de seguridad que la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto . + La regla de auditoría que se va a quitar. + + + Quita todas las reglas de auditoría que coinciden exactamente con la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto . + La regla de auditoría que se va a quitar. + + + Quita todas las reglas de acceso de la lista de control de acceso discrecional (DACL) asociada a este objeto y, a continuación, agrega la regla de acceso especificada. + La regla de acceso que se va a restablecer. + + + Quita todas las reglas de acceso que contienen el mismo identificador de seguridad y calificador que la regla de acceso especificada en la lista de control de acceso discrecional (DACL) asociada a ese objeto y, a continuación, agrega la regla de acceso especificada. + La regla de acceso que se va a establecer. + + + Quita todas las reglas de auditoría que contienen el mismo identificador de seguridad y calificador que la regla de auditoría especificada en la lista de control de acceso de sistema (SACL) asociada a ese objeto y, a continuación, agrega la regla de auditoría especificada. + La regla de auditoría que se va a establecer. + + + Representa un descriptor de seguridad.Un descriptor de seguridad incluye un propietario, un grupo primario, una lista de control de acceso discrecional (DACL) y una lista de control de acceso del sistema (SACL). + + + Inicializa una nueva instancia de la clase a partir de la matriz de valores de tipo byte especificada. + Es true si el nuevo descriptor de seguridad está asociado a un objeto contenedor. + Es true si el nuevo descriptor de seguridad está asociado a un objeto de directorio. + La matriz de valores de tipo byte a partir de la que se va a crear el nuevo objeto . + El desplazamiento en la matriz desde donde se empieza a copiar. + + + Inicializa una nueva instancia de la clase a partir de la información especificada. + Es true si el nuevo descriptor de seguridad está asociado a un objeto contenedor. + Es true si el nuevo descriptor de seguridad está asociado a un objeto de directorio. + Marcadores que especifican el comportamiento del nuevo objeto . + El propietario del nuevo objeto . + Objeto primario para el nuevo objeto . + Lista de control de acceso de sistema (SACL) para el nuevo objeto . + Lista de control de acceso discrecional (DACL) para el nuevo objeto . + + + Inicializa una nueva instancia de la clase a partir del objeto especificado. + Es true si el nuevo descriptor de seguridad está asociado a un objeto contenedor. + Es true si el nuevo descriptor de seguridad está asociado a un objeto de directorio. + Objeto a partir del cual se va a crear el nuevo objeto . + + + Inicializa una nueva instancia de la clase a partir de la cadena de lenguaje de definición de descriptores de seguridad (SDDL) especificada. + Es true si el nuevo descriptor de seguridad está asociado a un objeto contenedor. + Es true si el nuevo descriptor de seguridad está asociado a un objeto de directorio. + Cadena SDDL a partir de la cual se va a crear el nuevo objeto . + + + Establece el propiedad para este instancia y establece el marca. + Nivel de revisión del nuevo objeto . + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Establece el propiedad para este instancia y establece el marca. + Nivel de revisión del nuevo objeto . + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Obtiene valores que especifican el comportamiento del objeto . + Uno o más valores de la enumeración combinados con la operación OR lógica. + + + Obtiene o establece la lista de control de acceso discrecional (DACL) para este objeto .La DACL contiene las reglas de acceso. + La DACL para este objeto . + + + Obtiene o establece el grupo primario para este objeto . + Grupo primario para este objeto . + + + Obtiene un valor booleano que especifica si el objeto asociado a este objeto es un objeto contenedor. + Es true si el objeto asociado a este objeto es un objeto contenedor; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si la lista de control de acceso discrecional (DACL) asociada a este objeto está en orden canónico. + Es true si la DACL asociada a este objeto está en orden canónico; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si el objeto asociado a este objeto es un objeto de directorio. + Es true si el objeto asociado a este objeto es un objeto de directorio; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si la lista de control de acceso de sistema (SACL) asociada a este objeto está en orden canónico. + Es true si la SACL asociada a este objeto está en orden canónico; en caso contrario, es false. + + + Obtiene o establece el propietario del objeto asociado a este objeto . + El propietario del objeto asociado a este objeto . + + + Quita todas las reglas de acceso para el identificador de seguridad especificado de la lista de control de acceso discrecional (DACL) asociada a este objeto . + El identificador de seguridad para el que se van a quitar las reglas de acceso. + + + Quita todas las reglas de auditoría para el identificador de seguridad especificado de la lista de control de acceso de sistema (SACL) asociada a este objeto . + El identificador de seguridad para el que se van a quitar las reglas de auditoría. + + + Establece la protección de herencia para la lista de control de acceso discrecional (DACL) asociada a este objeto .Las DACL que están protegidas no heredan las reglas de acceso de los contenedores primarios. + Es true para proteger la DACL contra herencia. + Es true para mantener las reglas de acceso heredadas en la DACL; es false para quitar las reglas de acceso heredadas de la DACL. + + + Establece la protección de herencia para la lista de control de acceso de sistema (SACL) asociada a este objeto .Las SACL que están protegidas no heredan las reglas de auditoría de los contenedores primarios. + Es true para proteger la SACL contra herencia. + Es true para mantener las reglas de auditoría heredadas en SACL; es false para quitar las reglas de auditoría heredadas de SACL. + + + Obtiene o establece la lista de control de acceso de sistema (SACL) para este objeto .La SACL contiene reglas de auditoría. + SACL para este objeto . + + + Representa una entrada de control de acceso (ACE) compuesta. + + + Inicializa una nueva instancia de la clase . + Contiene marcadores que especifican información sobre la herencia, su propagación y las condiciones de auditoría de la nueva entrada de control de acceso (ACE). + La máscara de acceso para la ACE. + Valor de la enumeración . + + asociado a la nueva ACE. + + + Obtiene la longitud (en bytes) de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de calcular las referencias de la lista de control de acceso (ACL) en una matriz binaria mediante el método . + La longitud (en bytes) de la representación binaria del objeto actual. + + + Obtiene o establece el tipo de este objeto . + Tipo de este objeto . + + + Calcula las referencias del contenido del objeto en la matriz de bytes especificada, comenzando por la posición de desplazamiento indicada. + Matriz de bytes en la que se calculan las referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + El valor del parámetro es negativo o es un valor demasiado elevado como para poder copiar todo el contenido del objeto en el parámetro . + + + Especifica el tipo de un objeto . + + + El objeto se usa para la suplantación. + + + Estos marcadores afectan al comportamiento del descriptor de seguridad. + + + Especifica que la Lista de control de acceso discrecional (DACL) se ha heredado automáticamente del elemento primario.Sólo pueden establecerlo los administradores de recursos. + + + Se omitirá. + + + Especifica que la DACL se ha obtenido mediante un mecanismo de aplicación de valores predeterminados.Sólo pueden establecerlo los administradores de recursos. + + + Especifica que la DACL no es null.Pueden establecerlo los administradores de recursos o los usuarios. + + + Especifica que el administrador de recursos impide la herencia automática.Pueden establecerlo los administradores de recursos o los usuarios. + + + Se omitirá. + + + Especifica que el de grupo se ha obtenido mediante un mecanismo de aplicación de valores predeterminados.Sólo pueden establecerlo los administradores de recursos; no deberían establecerlo quienes llaman. + + + No existe ningún marcador de control. + + + Especifica que el de propietario se ha obtenido mediante un mecanismo de aplicación de valores predeterminados.Sólo pueden establecerlo los administradores de recursos; no deberían establecerlo quienes llaman. + + + Especifica que el contenido del campo Reserved es válido. + + + Especifica que la representación binaria del descriptor de seguridad está en el formato autorrelativo. Siempre se establece este marcador. + + + Se omitirá. + + + Especifica que la lista de control de acceso de sistema (SACL) se ha heredado automáticamente del elemento primario.Sólo pueden establecerlo los administradores de recursos. + + + Se omitirá. + + + Especifica que la SACL se ha obtenido mediante un mecanismo de aplicación de valores predeterminados.Sólo pueden establecerlo los administradores de recursos. + + + Especifica que la SACL no es null.Pueden establecerlo los administradores de recursos o los usuarios. + + + Especifica que el administrador de recursos impide la herencia automática.Pueden establecerlo los administradores de recursos o los usuarios. + + + Representa una entrada de control de acceso (ACE) que no ha definido uno de los miembros de la enumeración . + + + Inicializa una nueva instancia de la clase . + Tipo de la nueva entrada de control de acceso (ACE).Este valor debe ser mayor que . + Marcadores que especifican información sobre la herencia, la propagación de herencia y las condiciones de auditoría para la nueva ACE. + Matriz de valores de tipo byte que contiene los datos para la nueva ACE.Este valor puede ser null.La longitud de esta matriz no debe ser mayor que el valor del campo y debe ser un múltiplo de cuatro. + El valor del parámetro no es mayor que o la longitud de la matriz o es mayor que el valor del campo o no es múltiplo de cuatro. + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria utilizando el método . + La longitud, en bytes, de la representación binaria del objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + La matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Devuelve los datos opacos asociados a este objeto . + Matriz de valores de tipo byte que representa los datos opacos asociados a este objeto . + + + Devuelve la longitud máxima permitida de un objeto binario de datos opacos para este objeto . + + + Obtiene la longitud de los datos opacos asociada al objeto . + La longitud de los datos de devolución de llamada opacos. + + + Establece los datos de devolución de llamada opacos asociados a este objeto . + Matriz de valores de tipo byte que representa los datos de devolución de llamada opacos para este objeto . + + + Representa una lista de control de acceso discrecional (DACL). + + + Inicializa una nueva instancia de la clase con los valores especificados. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Nivel de revisión del nuevo objeto . + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Inicializa una nueva instancia de la clase con los valores especificados. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Inicializa una nueva instancia de la clase con los valores indicados del objeto especificado. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Objeto subyacente para el nuevo objeto .Especifique null para crear una ACL vacía. + + + Agrega una entrada de control de acceso (ACE) al objeto actual con los valores de configuración especificados. + El tipo de control de acceso (conceder o denegar) que se va a agregar. + Identificador para el que se va a agregar una ACE. + La regla de acceso para la nueva ACE. + Marcas que especifican las propiedades de herencia para la nueva ACE. + Marcas que especifican las propiedades de propagación de herencia para la nueva ACE. + + + Agrega una entrada de control de acceso (ACE) al objeto actual con los valores de configuración especificados.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado para la nueva ACE. + El tipo de control de acceso (conceder o denegar) que se va a agregar. + Identificador para el que se va a agregar una ACE. + La regla de acceso para la nueva ACE. + Marcas que especifican las propiedades de herencia para la nueva ACE. + Marcas que especifican las propiedades de propagación de herencia para la nueva ACE. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la nueva ACE. + La identidad de la clase de objetos secundarios que pueden heredar la nueva ACE. + + + Agrega una entrada de control de acceso (ACE) al objeto actual con los valores de configuración especificados. + El tipo de control de acceso (conceder o denegar) que se va a agregar. + Identificador para el que se va a agregar una ACE. + El para tener acceso al nuevo. + + + Quita la regla de control de acceso especificada del objeto actual. + Es true si este método quita correctamente el acceso especificado; de lo contrario, es false. + El tipo de control de acceso (conceder o denegar) que se va a quitar. + + para el que se va quitar una regla de control de acceso. + Máscara de acceso de la regla que se va a quitar. + Marcas que especifican las propiedades de herencia para la regla que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla que se va a quitar. + + + Quita la regla de control de acceso especificada del objeto actual.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado. + Es true si este método quita correctamente el acceso especificado; de lo contrario, es false. + El tipo de control de acceso (conceder o denegar) que se va a quitar. + + para el que se va quitar una regla de control de acceso. + Máscara de acceso de la regla de control de acceso que se va a quitar. + Marcas que especifican las propiedades de herencia de la regla de control de acceso que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla de control de acceso que se va a quitar. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la regla de control de acceso quitada. + La identidad de la clase de objetos secundarios que pueden heredar la regla de control de acceso quitada. + + + Quita la regla de control de acceso especificada del objeto actual. + Devuelve . + El tipo de control de acceso (conceder o denegar) que se va a quitar. + + para el que se va quitar una regla de control de acceso. + El para el que se va a quitar el acceso. + + + Quita la entrada de control de acceso (ACE) especificada del objeto actual. + El tipo de control de acceso (conceder o denegar) que se va a quitar. + Identificador para el que se va a quitar una ACE. + Máscara de acceso de la ACE que se va a quitar. + Marcas que especifican las propiedades de herencia de la ACE que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la ACE que se va a quitar. + + + Quita la entrada de control de acceso (ACE) especificada del objeto actual.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado para la ACE que se va a quitar. + El tipo de control de acceso (conceder o denegar) que se va a quitar. + Identificador para el que se va a quitar una ACE. + Máscara de acceso de la ACE que se va a quitar. + Marcas que especifican las propiedades de herencia de la ACE que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la ACE que se va a quitar. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la ACE quitada. + La identidad de la clase de objetos secundarios que pueden heredar la ACE quitada. + + + Quita la entrada de control de acceso (ACE) especificada del objeto actual. + El tipo de control de acceso (conceder o denegar) que se va a quitar. + Identificador para el que se va a quitar una ACE. + El para el que se va a quitar el acceso. + + + Establece el control de acceso especificado para el objeto especificado. + El tipo de control de acceso (conceder o denegar) que se va a establecer. + Identificador para el que se va a establecer una ACE. + La regla de acceso para la nueva ACE. + Marcas que especifican las propiedades de herencia para la nueva ACE. + Marcas que especifican las propiedades de propagación de herencia para la nueva ACE. + + + Establece el control de acceso especificado para el objeto especificado. + El tipo de control de acceso (conceder o denegar) que se va a establecer. + Identificador para el que se va a establecer una ACE. + La regla de acceso para la nueva ACE. + Marcas que especifican las propiedades de herencia para la nueva ACE. + Marcas que especifican las propiedades de propagación de herencia para la nueva ACE. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la nueva ACE. + La identidad de la clase de objetos secundarios que pueden heredar la nueva ACE. + + + Establece el control de acceso especificado para el objeto especificado. + El tipo de control de acceso (conceder o denegar) que se va a establecer. + Identificador para el que se va a establecer una ACE. + El para el que se va a establecer el acceso. + + + Representa un entrada de control de acceso (ACE) y es la clase base de todas las demás clases ACE. + + + Obtiene o establece la enumeración asociada al objeto . + Enumeración asociada al objeto . + + + Obtiene el tipo de esta entrada de control de acceso (ACE). + Tipo de esta ACE. + + + Obtiene la información de auditoría asociada a esta entrada de control de acceso (ACE). + Información de auditoría asociada a esta entrada de control de acceso (ACE). + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria utilizando el método . + Longitud, en bytes, de la representación binaria del objeto actual. + + + Crea una copia en profundidad de esta entrada de control de acceso (ACE). + Objeto que este método crea. + + + Crea un objeto a partir de los datos binarios especificados. + El objeto que crea este método. + Datos binarios a partir de los que se va a crear el nuevo objeto . + Posición de desplazamiento desde la cual comenzará la resolución de referencias. + + + Determina si el objeto especificado es igual al objeto actual. + Es true si el objeto especificado es igual al objeto actual; en caso contrario, es false. + Objeto que se va a comparar con el objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + Matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Sirve como función hash para la clase .El método es apto para el uso en algoritmos hash y estructuras de datos como una tabla hash. + Código hash para el objeto actual. + + + Obtiene marcadores que especifican las propiedades de herencia de esta entrada de control de acceso (ACE). + Marcadores que especifican las propiedades de herencia de esta ACE. + + + Obtiene un valor booleano que especifica si esta entrada de control de acceso (ACE) se hereda o se establece explícitamente. + Es true si esta ACE se hereda; en caso contrario, es false. + + + Determina si los objetos especificados se consideran iguales. + Es true si los dos objetos son iguales; en caso contrario, es false. + Primer objeto que se va a comparar. + Segundo objeto que se va a comparar. + + + Determina si los objetos especificados se consideran distintos. + Es true si los dos objetos son distintos; en caso contrario, es false. + Primer objeto que se va a comparar. + Segundo objeto que se va a comparar. + + + Obtiene marcadores que especifican las propiedades de propagación de herencia de esta entrada de control de acceso (ACE). + Marcadores que especifican las propiedades de propagación de herencia de esta ACE. + + + Representa una lista de control de acceso (ACL) y es la clase base de las clases , , y . + + + Inicializa una nueva instancia de la clase . + + + Nivel de revisión de la clase actual.La propiedad devuelve este valor para listas de control de acceso (ACL) no asociadas a objetos de Servicios de directorio. + + + Nivel de revisión de la clase actual.La propiedad devuelve este valor para listas de control de acceso (ACL) asociadas a objetos de Servicios de directorio. + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria con el método . + La longitud, en bytes, de la representación binaria del objeto actual. + + + Copia cada objeto del objeto actual a la matriz especificada. + Matriz en la que se colocan copias de los objetos de la clase actual. + Índice de base cero de la matriz donde se comienza a copiar. + + + Obtiene el número de entradas de control de acceso (ACE) del objeto actual. + Número de ACE del objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + Matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Devuelve una nueva instancia de la clase . + Objeto que este método devuelve. + + + Esta propiedad siempre se establece en false.Sólo se implementa porque se requiere para la implementación de la interfaz . + false, siempre. + + + Obtiene o establece el objeto en el índice especificado. + + en el índice especificado. + Índice de base cero del objeto que se va a obtener o establecer. + + + Longitud máxima binaria permitida de un objeto . + + + Obtiene el nivel de revisión del objeto . + Valor de tipo byte que indica el nivel de revisión del objeto . + + + Esta propiedad devuelve siempre null.Sólo se implementa porque se requiere para la implementación de la interfaz . + Siempre devuelve null. + + + Copia cada objeto del objeto actual a la matriz especificada. + Matriz en la que se colocan copias de los objetos de la clase actual. + Índice de base cero de la matriz donde se comienza a copiar. + + + Devuelve una nueva instancia de la clase convertida como una instancia de la interfaz . + Nuevo objeto , convertido como instancia de la interfaz . + + + Representa un descriptor de seguridad.Un descriptor de seguridad incluye un propietario, un grupo primario, una lista de control de acceso discrecional (DACL) y una lista de control de acceso de sistema (SACL). + + + Inicializa una nueva instancia de la clase . + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria utilizando el método . + La longitud, en bytes, de la representación binaria del objeto actual. + + + Obtiene valores que especifican el comportamiento del objeto . + Uno o más valores de la enumeración combinados con la operación OR lógica. + + + Devuelve una matriz de valores de tipo byte que representa la información contenida en este objeto . + La matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Devuelve la representación de lenguaje de definición de descriptores de seguridad (SDDL) de las secciones especificadas del descriptor de seguridad que este objeto representa. + Representación de SDDL de las secciones especificadas del descriptor de seguridad asociadas a este objeto . + Especifica qué secciones (reglas de acceso, reglas de auditoría, grupo primario, propietario) del descriptor de seguridad se van a obtener. + + + Obtiene o establece el grupo primario para este objeto . + Grupo primario para este objeto . + + + Devuelve un valor booleano que especifica si el descriptor de seguridad asociado a este objeto se puede convertir al formato de lenguaje de definición de descriptores de seguridad (SDDL). + Es true si el descriptor de seguridad asociado a este objeto se puede convertir al formato de lenguaje de definición de descriptores de seguridad (SDDL); en caso contrario, es false. + + + Obtiene o establece el propietario del objeto asociado a este objeto . + El propietario del objeto asociado a este objeto . + + + Obtiene el nivel de revisión del objeto . + Valor de tipo byte que indica el nivel de revisión del objeto . + + + Los marcadores de herencia especifican la semántica de herencia de las entradas de control de acceso (ACE). + + + Los objetos contenedores secundarios se heredan de la ACE. + + + Los objetos secundarios no se heredan de la ACE. + + + Los objetos hoja secundarios se heredan de la ACE. + + + Encapsula todos los tipos de entradas de control de acceso (ACE) actualmente definidas por Microsoft Corporation.Todos los objetos contienen una máscara de acceso de 32 bits y un objeto . + + + Obtiene o establece la máscara de acceso de este objeto . + Máscara de acceso de este objeto . + + + Obtiene o establece el objeto asociado a este objeto . + Objeto asociado a este objeto . + + + Proporciona la capacidad para controlar el acceso a los objetos nativos sin la manipulación directa de listas de control de acceso (ACL).La enumeración define los tipos de objeto nativos. + + + Inicializa una nueva instancia de la clase con los valores especificados. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + + + Inicializa una nueva instancia de la clase con los valores especificados.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + El identificador del objeto que se puede proteger al que se asocia el nuevo objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a incluir en el objeto . + + + Inicializa una nueva instancia de la clase con los valores especificados.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + El identificador del objeto que se puede proteger al que se asocia el nuevo objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a incluir en el objeto . + Delegado implementado por integradores que proporciona las excepciones personalizadas. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Inicializa una nueva instancia de la clase utilizando los valores especificados. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + Delegado implementado por integradores que proporciona las excepciones personalizadas. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Inicializa una nueva instancia de la clase con los valores especificados.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + El nombre del objeto que se puede proteger al que se asocia el nuevo objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a incluir en el objeto . + + + Inicializa una nueva instancia de la clase con los valores especificados.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Es true si el nuevo objeto es un contenedor. + Tipo de objeto que se puede proteger al que se asocia el nuevo objeto . + El nombre del objeto que se puede proteger al que se asocia el nuevo objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a incluir en el objeto . + Delegado implementado por integradores que proporciona las excepciones personalizadas. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + El identificador del objeto que se puede proteger al que se asocia este objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + El objeto que se puede proteger al que se asocia este objeto es un directorio o un archivo y no se ha podido encontrar ese directorio o archivo. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + El identificador del objeto que se puede proteger al que se asocia este objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + El objeto que se puede proteger al que se asocia este objeto es un directorio o un archivo y no se ha podido encontrar ese directorio o archivo. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + El nombre del objeto que se puede proteger al que se asocia este objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + El objeto que se puede proteger al que se asocia este objeto es un directorio o un archivo y no se ha podido encontrar ese directorio o archivo. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + El nombre del objeto que se puede proteger al que se asocia este objeto . + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + El objeto que se puede proteger al que se asocia este objeto es un directorio o un archivo y no se ha podido encontrar ese directorio o archivo. + + + Proporciona a los integradores una manera de asignar códigos de error numéricos a excepciones concretas que crean. + Objeto que este delegado crea. + Código de error numérico. + Nombre del objeto asegurable con el que el objeto está asociado. + Identificador del objeto asegurable con el que el objeto está asociado. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Representa una combinación de la identidad de un usuario, una máscara de acceso y un tipo de control de acceso (conceder o denegar).Un objeto también contiene información sobre el tipo de objeto al que se aplica la regla, el tipo de objeto secundario que puede heredar la regla, cómo los objetos secundarios heredan la regla y cómo se propaga la herencia. + + + Inicializa una nueva instancia de la clase con los valores especificados. + Identidad a la que se aplica la regla de acceso. Debe ser un objeto que pueda convertirse en un objeto . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true si esta regla se hereda de un contenedor primario. + Especifica las propiedades de herencia de la regla de acceso. + Especifica si se propagan automáticamente las reglas de acceso heredadas.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + Tipo de objeto al que se aplica la regla. + Tipo de objeto secundario que puede heredar la regla. + Especifica si esta regla concede o deniega el acceso. + El valor del parámetro no puede convertirse en un objeto o el parámetro contiene un valor que no es válido. + El valor del parámetro es 0, o los parámetros o contienen valores de marcadores no reconocidos. + + + Obtiene el tipo de objeto secundario que puede heredar el objeto . + Tipo de objeto secundario que puede heredar el objeto . + + + Obtiene marcadores que especifican si las propiedades y del objeto contienen valores válidos. + + especifica que la propiedad contiene un valor válido. especifica que la propiedad contiene un valor válido.Estos valores pueden combinarse con un operador lógico OR. + + + Obtiene el tipo de objeto al que se aplica . + Tipo de objeto al que se aplica . + + + Controla el acceso a los objetos de Servicios de directorio. Esta clase representa un entrada de control de acceso (ACE) asociada a un objeto de directorio. + + + Inicia una nueva instancia de la clase . + Herencia, propagación de herencia y condiciones de auditoría para la nueva entrada de control de acceso (ACE). + El uso de la nueva ACE. + La máscara de acceso para la ACE. + + asociado a la nueva ACE. + Determina si los parámetros e contienen los GUID de objeto válidos. + GUID que identifica el tipo de objeto al que se aplica la nueva ACE. + GUID que identifica el tipo de objeto que puede heredar la nueva ACE. + true si la nueva ACE es un tipo de devolución de llamada de ACE. + Los datos opacos asociados a la nueva ACE.Esto sólo se permite para tipos ACE de devolución de llamada.La longitud de esta matriz no debe ser mayor que el valor devuelto del método . + El parámetro de calificador contiene un valor no válido o la longitud del valor del parámetro opaco es mayor que el valor devuelto del método . + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria utilizando el método . + Longitud, en bytes, de la representación binaria del objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + Matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Obtiene o establece el GUID del tipo de objeto que puede heredar la entrada de control de acceso (ACE) que este objeto representa. + GUID del tipo de objeto que puede heredar la entrada de control de acceso (ACE) que este objeto representa. + + + Devuelve la longitud máxima permitida, en bytes, de un objeto binario de datos opaco para entradas de control de acceso (ACE) de devolución de llamada. + Longitud máxima permitida, en bytes, de un objeto binario de datos opaco para entradas de control de acceso (ACE) de devolución de llamada. + Es true si es un tipo ACE de devolución de llamada. + + + Obtiene o establece marcadores que especifican si las propiedades e contienen valores que identifican los tipos de objeto válidos. + Uno o más miembros de la enumeración combinados con la operación O lógica. + + + Obtiene o establece el GUID del tipo de objeto asociado a este objeto . + GUID del tipo de objeto asociado a este objeto . + + + Especifica la presencia de tipos de objeto para entradas de control de acceso (ACE). + + + Tipo de objeto que puede heredar la ACE. + + + No hay ningún tipo de objeto presente. + + + El tipo de objeto asociado a la ACE está presente. + + + Representa una combinación de la identidad de un usuario, una máscara de acceso y las condiciones de auditoría.Un objeto también contiene información sobre el tipo de objeto al que se aplica la regla, el tipo de objeto secundario que puede heredarla, la forma en que la heredan los objetos secundarios y la forma en que se propaga esa herencia. + + + Inicializa una nueva instancia de la clase . + Identidad a la que se aplica la regla de acceso. Debe ser un objeto que pueda convertirse en un objeto . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true si esta regla se hereda de un contenedor primario. + Especifica las propiedades de herencia de la regla de acceso. + Indica si las reglas de acceso heredadas se propagan automáticamente.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + Tipo de objeto al que se aplica la regla. + Tipo de objeto secundario que puede heredar la regla. + Condiciones de auditoría. + El valor del parámetro no puede convertirse en un objeto o el parámetro contiene un valor que no es válido. + El valor del parámetro es 0, o los parámetros o contienen valores de marcadores no reconocidos. + + + Obtiene el tipo de objeto secundario que puede heredar el objeto . + Tipo de objeto secundario que puede heredar el objeto . + + + Las propiedades y del objeto contienen valores válidos. + + especifica que la propiedad contiene un valor válido. especifica que la propiedad contiene un valor válido.Estos valores pueden combinarse con un operador lógico OR. + + + Obtiene el tipo de objeto al que se aplica . + Tipo de objeto al que se aplica . + + + Proporciona la capacidad para controlar el acceso a los objetos sin la manipulación directa de listas de control de acceso (ACL).Esta clase es la clase base abstracta de las clases y . + + + Inicializa una nueva instancia de la clase . + + + Inicializa una nueva instancia de la clase . + Es true si el nuevo objeto es un objeto contenedor. + Es true si el nuevo objeto es un objeto de directorio. + + + Inicializa una nueva instancia de la clase . + Propiedad de la nueva instancia de . + + + Obtiene el objeto del objeto asegurable asociado a este objeto . + Tipo del objeto asegurable asociado a este objeto . + + + Inicializa una nueva instancia de la clase con los valores especificados. + Objeto que crea este método. + Identidad a la que se aplica la regla de acceso.Debe ser un objeto que pueda convertirse en un objeto . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true si esta regla se hereda de un contenedor principal. + Especifica las propiedades de herencia de la regla de acceso. + Especifica si se propagan automáticamente las reglas de acceso heredadas.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + Especifica el tipo de control de acceso válido. + + + Obtiene o establece un valor booleano que especifica si se han modificado las reglas de acceso asociadas a este objeto . + Es true si se han modificado las reglas de acceso asociadas a este objeto ; de lo contrario, es false. + + + Obtiene el objeto del objeto asociado a las reglas de acceso de este objeto . debe ser un objeto que permita su conversión al objeto . + Tipo del objeto asociado a las reglas de acceso de este objeto . + + + Obtiene un valor booleano que especifica si las reglas de acceso asociadas a este objeto están en orden canónico. + Es true si las reglas de acceso están en orden canónico; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si está protegida la lista de control de acceso discrecional (DACL) asociada a este objeto . + Es true si la DACL está protegida; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si las reglas de auditoría asociadas a este objeto están en orden canónico. + Es true si las reglas de auditoría están en orden canónico; en caso contrario, es false. + + + Obtiene un valor booleano que especifica si está protegida la lista de control de acceso del sistema (SACL) asociada a este objeto . + Es true si la SACL está protegida; en caso contrario, es false. + + + Inicializa una nueva instancia de la clase con los valores especificados. + Objeto que crea este método. + La identidad a la que se aplica la regla de auditoría.Debe ser un objeto que pueda convertirse en un objeto . + La máscara de acceso de esta regla.La máscara de acceso es una colección de 32 bits de bits anónimos, cuyo significado queda definido por cada uno de sus integrantes individuales. + Es true si esta regla se hereda de un contenedor primario. + Especifica las propiedades de herencia de la regla de auditoría. + Especifica si se propagan automáticamente las reglas de auditoría heredadas.Los marcadores de propagación se omiten si el valor del parámetro se establece en . + Especifica las condiciones para las que se audita la regla. + + + Obtiene o establece un valor booleano que especifica si se han modificado las reglas de auditoría asociadas a este objeto . + Es true si se han modificado las reglas de auditoría asociadas a este objeto ; de lo contrario, es false. + + + Obtiene el objeto asociado a las reglas de auditoría de este objeto . debe ser un objeto que permita su conversión al objeto . + Tipo del objeto asociado a las reglas de auditoría de este objeto . + + + Obtiene el grupo primario asociado al propietario especificado. + El grupo primario asociado al propietario especificado. + El propietario para el que se va a obtener el grupo primario. + + + + + + Obtiene el propietario asociado al grupo primario especificado. + El propietario asociado al grupo especificado. + El grupo primario para el que se va a obtener el propietario. + + + + + + Devuelve una matriz de valores de tipo byte que representa la información del descriptor de seguridad para este objeto . + Matriz de valores de tipo byte que representa el descriptor de seguridad para este objeto .Este método devuelve null si no hay ninguna información de seguridad de este objeto . + + + Devuelve la representación de lenguaje de definición de descriptores de seguridad (SDDL) de las secciones especificadas del descriptor de seguridad asociadas a este objeto . + Representación de SDDL de las secciones especificadas del descriptor de seguridad asociadas a este objeto . + Especifica qué secciones (reglas de acceso, reglas de auditoría, grupo primario, propietario) del descriptor de seguridad se van a obtener. + + + Obtiene o establece un valor booleano que especifica si se ha modificado el grupo asociado al objeto que se puede proteger. + Es true si se ha modificado el grupo asociado al objeto que se puede proteger; de lo contrario es false. + + + Obtiene un valor booleano que especifica si este objeto es un objeto contenedor. + Es true si el objeto es un objeto contenedor; en caso contrario es false. + + + Obtiene un valor booleano que especifica si este objeto es un objeto de directorio. + Es true si el objeto es un objeto de directorio; en caso contrario es false. + + + Devuelve un valor booleano que especifica si el descriptor de seguridad asociado a este objeto se puede convertir al formato de lenguaje de definición de descriptores de seguridad (SDDL). + Es true si el descriptor de seguridad asociado a este objeto se puede convertir al formato de lenguaje de definición de descriptores de seguridad (SDDL); en caso contrario, es false. + + + Aplica la modificación especificada a la lista de control de acceso discrecional (DACL) asociada a este objeto . + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + La modificación que se va a aplicar a la DACL. + La regla de acceso que se va a modificar. + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + + + Aplica la modificación especificada a la lista de control de acceso discrecional (DACL) asociada a este objeto . + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + La modificación que se va a aplicar a la DACL. + La regla de acceso que se va a modificar. + Es true si se modifica correctamente la lista DACL; en caso contrario, es false. + + + Aplica la modificación especificada a la lista de control de acceso del sistema (SACL) asociada a este objeto . + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + Modificación que se va a aplicar a la SACL. + La regla de auditoría que se va a modificar. + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + + + Aplica la modificación especificada a la lista de control de acceso del sistema (SACL) asociada a este objeto . + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + Modificación que se va a aplicar a la SACL. + La regla de auditoría que se va a modificar. + Es true si se modifica correctamente la lista SACL; en caso contrario, es false. + + + Obtiene o establece un valor booleano que especifica si se ha modificado el propietario del objeto que se puede proteger. + Es true si se ha modificado el propietario del objeto que se puede proteger; de lo contrario es false. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + true para habilitar el privilegio que permite al llamador hacerse con la propiedad del objeto. + Nombre utilizado para recuperar la información almacenada. + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Identificador utilizado para recuperar la información almacenada. + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + + + Guarda las secciones especificadas del descriptor de seguridad asociado a este objeto en una ubicación de almacenamiento permanente.Es recomendable pasar los valores de los parámetros al constructor y que los métodos Persist sean idénticos.Para obtener más información, vea la sección Comentarios. + Nombre utilizado para recuperar la información almacenada. + Uno de los valores de la enumeración que especifica las secciones del descriptor de seguridad (reglas de acceso, reglas de auditoría, propietario y grupo principal) del objeto que se puede proteger y que se va a guardar. + + + Quita todas las reglas de acceso asociadas al objeto especificado. + Objeto para el que se van a quitar todas las reglas de acceso. + No todas las reglas de acceso están en orden canónico. + + + Quita todas las reglas de auditoría asociadas al objeto especificado. + Objeto para el que se van a quitar todas las reglas de auditoría. + No todas las reglas de acceso están en orden canónico. + + + Bloquea este objeto para el acceso de lectura. + + + Desbloquea este objeto para el acceso de lectura. + + + Establece o quita la protección de las reglas de acceso asociadas a este objeto .Los objetos primarios no pueden modificar mediante herencia las reglas de acceso protegidas. + Es true para proteger las reglas de acceso asociadas a este objeto contra la herencia; es false para permitir la herencia. + Es true para conservar las reglas de acceso heredadas; es false para quitar las reglas de acceso heredadas.Se omite este parámetro si es false. + Este método intenta quitar las reglas heredadas de una lista de control de acceso discrecional (DACL) no canónica. + + + Establece o quita la protección de las reglas de auditoría asociadas a este objeto .Los objetos primarios no pueden modificar mediante herencia las reglas de auditoría protegidas. + Es true para proteger las reglas de auditoría asociadas a este objeto contra la herencia; es false para permitir la herencia. + Es true para conservar las reglas de auditoría heredadas; es false para quitar las reglas de auditoría heredadas.Se omite este parámetro si es false. + Este método intenta quitar las reglas heredadas de una lista de control de acceso de sistema (SACL) no canónica. + + + Establece el grupo primario para el descriptor de seguridad asociado a este objeto . + Grupo primario que se va a establecer. + + + Establece el propietario para el descriptor de seguridad asociado a este objeto . + Propietario que se va a establecer. + + + Establece el descriptor de seguridad para este objeto a partir de la matriz de valores de tipo byte especificada. + Matriz de bytes a partir de la cual se va a establecer el descriptor de seguridad. + + + Establece las secciones especificadas del descriptor de seguridad para este objeto a partir de la matriz de valores de tipo byte especificada. + Matriz de bytes a partir de la cual se va a establecer el descriptor de seguridad. + Las secciones (reglas de acceso, reglas de auditoría, propietario, grupo primario) del descriptor de seguridad que se van a establecer. + + + Establece el descriptor de seguridad para este objeto a partir de la cadena de lenguaje de definición de descriptores de seguridad (SDDL) especificada. + Cadena SDDL a partir de la que se va a establecer el descriptor de seguridad. + + + Establece las secciones especificadas del descriptor de seguridad para este objeto a partir de la cadena de lenguaje de definición de descriptores de seguridad (SDDL) especificada. + Cadena SDDL a partir de la que se va a establecer el descriptor de seguridad. + Las secciones (reglas de acceso, reglas de auditoría, propietario, grupo primario) del descriptor de seguridad que se van a establecer. + + + Bloquea este objeto para el acceso de escritura. + + + Desbloquea este objeto para el acceso de escritura. + + + Proporciona la capacidad de controlar el acceso a objetos sin la manipulación directa de las listas de control de acceso (ACL); también concede la capacidad para derechos de acceso de la conversión de tipo. + Derechos de acceso para el objeto. + + + Inicializa una nueva instancia de la clase ObjectSecurity’ 1. + Es true si el nuevo objeto es un objeto contenedor. + Tipo de recurso. + + + Inicializa una nueva instancia de la clase ObjectSecurity’ 1. + Es true si el nuevo objeto es un objeto contenedor. + Tipo de recurso. + Un identificador. + Secciones que se van a incluir. + + + Inicializa una nueva instancia de la clase ObjectSecurity’ 1. + Es true si el nuevo objeto es un objeto contenedor. + Tipo de recurso. + Un identificador. + Secciones que se van a incluir. + Delegado implementado por integradores que proporciona las excepciones personalizadas. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Inicializa una nueva instancia de la clase ObjectSecurity’ 1. + Es true si el nuevo objeto es un objeto contenedor. + Tipo de recurso. + El nombre del objeto que se puede proteger al que se asocia el nuevo objeto . + Secciones que se van a incluir. + + + Inicializa una nueva instancia de la clase ObjectSecurity’ 1. + Es true si el nuevo objeto es un objeto contenedor. + Tipo de recurso. + El nombre del objeto que se puede proteger al que se asocia el nuevo objeto . + Secciones que se van a incluir. + Delegado implementado por integradores que proporciona las excepciones personalizadas. + Objeto que contiene información contextual sobre el origen o el destino de la excepción. + + + Obtiene el tipo del objeto protegible asociado a este objeto ObjectSecurity ’1. + El tipo del objeto protegible asociado con las reglas de auditoría de la instancia actual. + + + Inicializa una nueva instancia de la clase ObjectAccessRule que representa una nueva regla de control de acceso para el objeto de seguridad asociado. + Representa una nueva regla de control de acceso para el usuario indicado con los derechos de acceso, el control de acceso y los marcadores especificados. + Representa una cuenta de usuario. + Tipo de acceso. + true si se hereda la regla de acceso; de lo contrario, false. + Especifica cómo se propagan las máscaras de acceso a los objetos secundarios. + Especifica la forma de propagar las entradas de control de acceso (ACE) a los objetos secundarios. + Especifica si el acceso se concede o se deniega. + + + Obtiene el tipo del objeto asociado a las reglas de acceso de este objeto ObjectSecurity ’1. + El tipo del objeto que está asociado con las reglas de acceso de la instancia actual. + + + Agrega la regla de acceso especificada a la lista de control de acceso discrecional (DACL) asociada a este objeto ObjectSecurity`1. + La regla que se va a agregar. + + + Agrega la regla de auditoría especificada a la lista de control de acceso de sistema (SACL) asociada a este objeto ObjectSecurity`1. + La regla de auditoría que se va a agregar. + + + Inicializa una nueva instancia de la clase que representa la regla de auditoría especificada para el usuario especificado. + Devuelve la regla especificada de auditoría para el usuario especificado. + Representa una cuenta de usuario. + Entero que especifica un tipo de acceso. + true si se hereda la regla de acceso; de lo contrario, false. + Especifica cómo se propagan las máscaras de acceso a los objetos secundarios. + Especifica la forma de propagar las entradas de control de acceso (ACE) a los objetos secundarios. + Describe el tipo de auditoría que se debe realizar. + + + Obtiene el tipo del objeto asociado a las reglas de auditoría de este objeto ObjectSecurity ’1. + El objeto Type asociado con las reglas de auditoría de la instancia actual. + + + Guarda el descriptor de seguridad asociado a este objeto ObjectSecurity`1 en una ubicación de almacenamiento permanente, mediante el identificador especificado. + El identificador del objeto que se puede proteger al que se asocia este objeto ObjectSecurity`1. + + + Guarda el descriptor de seguridad asociado a este objeto ObjectSecurity`1 en una ubicación de almacenamiento permanente, mediante el nombre especificado. + El nombre del objeto que se puede proteger al que se asocia este objeto ObjectSecurity`1. + + + Quita las reglas de acceso que contienen el mismo identificador de seguridad y máscara de acceso que la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto ObjectSecurity`1. + Devuelve true si la regla se quitó satisfactoriamente; en caso contrario, false. + La regla que se va a quitar. + + + Quita todas las reglas de acceso que tienen el mismo identificador de seguridad que la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto ObjectSecurity`1. + La regla de acceso que se va a quitar. + + + Quita todas las reglas de acceso que coinciden exactamente con la regla de acceso especificada de la lista de control de acceso discrecional (DACL) asociada a este objeto ObjectSecurity`1. + La regla de acceso que se va a quitar. + + + Quita las reglas de auditoría que contienen el mismo identificador de seguridad y máscara de acceso que la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto ObjectSecurity`1. + Devuelve true si el objeto se quitó; de lo contrario, es false. + La regla de auditoría que se va a quitar + + + Quita todas las reglas de auditoría que tienen el mismo identificador de seguridad que la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto ObjectSecurity`1. + La regla de auditoría que se va a quitar. + + + Quita todas las reglas de auditoría que coinciden exactamente con la regla de auditoría especificada de la lista de control de acceso de sistema (SACL) asociada a este objeto ObjectSecurity`1. + La regla de auditoría que se va a quitar. + + + Quita todas las reglas de acceso de la lista de control de acceso discrecional (DACL) asociada a este objeto ObjectSecurity`1 y, a continuación, agrega la regla de acceso especificada. + La regla de acceso que se va a restablecer. + + + Quita todas las reglas de acceso que contienen el mismo identificador de seguridad y calificador que la regla de acceso especificada en la lista de control de acceso discrecional (DACL) asociada a ese objeto ObjectSecurity`1 y, a continuación, agrega la regla de acceso especificada. + La regla de acceso que se va a establecer. + + + Quita todas las reglas de auditoría que contienen el mismo identificador de seguridad y calificador que la regla de auditoría especificada en la lista de control de acceso de sistema (SACL) asociada a ese objeto ObjectSecurity`1 y, a continuación, agrega la regla de auditoría especificada. + La regla de auditoría que se va a establecer. + + + Excepción que se produce cuando un método del espacio de nombres intenta habilitar un privilegio que no tiene. + + + Inicializa una nueva instancia de la clase . + + + Inicializa una nueva instancia de la clase utilizando el privilegio especificado. + El privilegio que no está habilitado. + + + Inicializa una nueva instancia de la clase utilizando la excepción especificada. + El privilegio que no está habilitado. + La excepción que es la causa de la excepción actual.Si el parámetro no es una referencia nula (Nothing en Visual Basic), la excepción actual se produce en un bloque catch que controla la excepción interna. + + + Obtiene el nombre del privilegio que no está habilitado. + El nombre del privilegio que el método no ha podido habilitar. + + + Especifica la forma en que las entradas de control de acceso (ACE) se propagan a los objetos secundarios. Estos marcadores sólo son significativos si hay marcadores de herencia. + + + Especifica que la ACE sólo se propaga a los objetos secundarios,donde se incluyen tanto el contenedor como los objetos hoja secundarios. + + + Especifica que no se han establecido marcadores de herencia. + + + Especifica que la ACE no se propaga a los objetos secundarios. + + + Representa una entrada de control de acceso (ACE) que contiene un calificador.El calificador, representado por un objeto , especifica si la ACE concede o deniega el acceso, produce auditorías del sistema o alarmas del sistema.La clase es la clase base abstracta de las clases y . + + + Obtiene un valor que especifica si la ACE concede o deniega el acceso, o produce auditorías o alarmas del sistema. + Valor que especifica si la ACE concede o deniega el acceso, o produce auditorías o alarmas del sistema. + + + Devuelve los datos de devolución de llamada opacos asociados a este objeto . + Matriz de valores de tipo byte que representa los datos de devolución de llamada opacos asociados a este objeto . + + + Especifica si este objeto contiene los datos de devolución de llamada. + Es true si este objeto contiene los datos de devolución de llamada; de lo contrario, es false. + + + Obtiene la longitud de los datos de devolución de llamada opacos asociados al objeto .Esta propiedad sólo es válida para entradas de control de acceso (ACE) de devolución de llamada. + La longitud de los datos de devolución de llamada opacos. + + + Establece los datos de devolución de llamada opacos asociados a este objeto . + Matriz de valores de tipo byte que representa los datos de devolución de llamada opacos para este objeto . + + + Representa una lista de control de acceso (ACL). + + + Inicializa una nueva instancia de la clase con el nivel de revisión especificado. + El nivel de revisión de la nueva lista de control de acceso (ACL). + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente será utilizado como una sugerencia. + + + Inicializa una nueva instancia de la clase a partir del tipo binario especificado. + Una matriz de valores de tipo byte que representa una lista de control de acceso (ACL). + El desplazamiento del parámetro desde donde se empiezan a resolver los datos. + + + Obtiene la longitud, en bytes, de la representación binaria del objeto actual.Debe utilizarse este valor de longitud antes de hacer el cálculo de referencias entre la lista ACL y una matriz binaria utilizando el método . + La longitud, en bytes, de la representación binaria del objeto actual. + + + Obtiene el número de entradas de control de acceso (ACE) del objeto actual. + El número de ACE del objeto actual. + + + Realiza el cálculo de referencias entre el contenido del objeto y la matriz de bytes especificada a partir de la posición de desplazamiento indicada. + La matriz de bytes para la cual se va a realizar el cálculo de referencias del contenido del objeto . + El desplazamiento desde el cual comenzará el cálculo de referencias. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Inserta la entrada de control de acceso indicada (ACE) en el índice especificado. + Posición en la que va a agregarse la nueva ACE.Especifique el valor de la propiedad para insertar una ACE al final del objeto . + La ACE que se va a insertar. + + es negativo o un valor demasiado alto para que se pueda copiar todo el contenido de en . + + + Obtiene o establece la entrada de control de acceso (ACE) en el índice especificado. + La ACE que se encuentra en el índice especificado. + Índice de base cero de la ACE que se va a obtener o establecer. + + + Quita la entrada de control de acceso (ACE) en la ubicación especificada. + Índice de base cero de la ACE que se va a quitar. + El valor del parámetro es más alto que el valor de la propiedad menos uno o es negativo. + + + Obtiene el nivel de revisión del objeto . + Valor de tipo byte que indica el nivel de revisión del objeto . + + + Representa un descriptor de seguridad.Un descriptor de seguridad incluye un propietario, un grupo primario, una lista de control de acceso discrecional (DACL) y una lista de control de acceso de sistema (SACL). + + + Inicializa una nueva instancia de la clase a partir de la matriz de valores de tipo byte especificada. + La matriz de valores de tipo byte a partir de la que se va a crear el nuevo objeto . + El desplazamiento en la matriz desde donde se empieza a copiar. + + + Inicializa una nueva instancia de la clase con los valores especificados. + Marcadores que especifican el comportamiento del nuevo objeto . + El propietario del nuevo objeto . + Objeto primario para el nuevo objeto . + Lista de control de acceso de sistema (SACL) para el nuevo objeto . + Lista de control de acceso discrecional (DACL) para el nuevo objeto . + + + Inicializa una nueva instancia de la clase a partir de la cadena de lenguaje de definición de descriptores de seguridad (SDDL) especificada. + Cadena SDDL a partir de la cual se va a crear el nuevo objeto . + + + Obtiene valores que especifican el comportamiento del objeto . + Uno o más valores de la enumeración combinados con la operación OR lógica. + + + Obtiene o establece la lista de control de acceso discrecional (DACL) para este objeto .La DACL contiene las reglas de acceso. + DACL para este objeto . + + + Obtiene o establece el grupo primario para este objeto . + Grupo primario para este objeto . + + + Obtiene o establece el propietario del objeto asociado a este objeto . + El propietario del objeto asociado a este objeto . + + + Obtiene o establece un valor de tipo byte que representa los bits de control del administrador de recursos asociado a este objeto . + Un valor de tipo byte que representa los bits de control del administrador de recursos asociado a este objeto . + + + Establece la propiedad de este objeto en el valor especificado. + Uno o más valores de la enumeración combinados con la operación OR lógica. + + + Obtiene o establece la lista de control de acceso de sistema (SACL) para este objeto .La SACL contiene reglas de auditoría. + SACL para este objeto . + + + Especifica los tipos de objeto nativos definidos. + + + Objeto de servicio de directorio (DS, Directory Service) o conjunto de propiedades o propiedad de un objeto de servicio de directorio. + + + Objeto de servicio de directorio y todos sus conjuntos de propiedades y propiedades. + + + Archivo o directorio. + + + Objeto del kernel local. + + + Recurso compartido de red. + + + Impresora. + + + Objeto definido por un proveedor. + + + Clave del Registro. + + + Objeto para una entrada del Registro bajo WOW64. + + + Servicio de Windows. + + + Tipo de objeto desconocido. + + + Estación de ventana u objeto de escritorio en el equipo local. + + + Objeto de Instrumental de administración de Windows (WMI). + + + Especifica la sección de un descriptor de seguridad que se va a consultar o establecer. + + + Especifica la lista de control de acceso discrecional (DACL, Discretionary Access Control List). + + + Especifica el identificador de grupo principal. + + + Especifica el identificador del propietario. + + + Especifica la lista de control de acceso al sistema (SACL, System Access Control List). + + + Representa una lista de control de acceso del sistema (SACL). + + + Inicializa una nueva instancia de la clase con los valores especificados. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Nivel de revisión del nuevo objeto . + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Inicializa una nueva instancia de la clase con los valores especificados. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Número de entradas de control de acceso (ACE) que este objeto puede contener.Este número solamente se usará como una sugerencia. + + + Inicializa una nueva instancia de la clase con los valores indicados del objeto especificado. + true si el nuevo objeto es un contenedor. + true si el nuevo objeto es una lista de control de acceso (ACL) de objetos de directorio. + Objeto subyacente para el nuevo objeto .Especifique null para crear una ACL vacía. + + + Agrega una regla de auditoría al objeto actual. + Tipo de regla de auditoría que se va a agregar. + Identificador para el que se va a agregar una regla de auditoría. + Máscara de acceso para la nueva regla de auditoría. + Marcas que especifican las propiedades de herencia de la nueva regla de auditoría. + Marcas que especifican las propiedades de propagación de herencia para la nueva regla de auditoría. + + + Agrega una regla de auditoría con la configuración especificada al objeto actual.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado para la nueva regla de auditoría. + Tipo de regla de auditoría que se va a agregar. + Identificador para el que se va a agregar una regla de auditoría. + Máscara de acceso para la nueva regla de auditoría. + Marcas que especifican las propiedades de herencia de la nueva regla de auditoría. + Marcas que especifican las propiedades de propagación de herencia para la nueva regla de auditoría. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la nueva regla de auditoría. + La identidad de la clase de objetos secundarios que pueden heredar la nueva regla de auditoría. + + + Agrega una regla de auditoría al objeto actual. + Identificador para el que se va a agregar una regla de auditoría. + El para la nueva regla de auditoría. + + + Quita la regla de auditoría especificada del objeto actual. + Es true si este método quita correctamente la regla de auditoría especificada; de lo contrario, es false. + Tipo de regla de auditoría que se va a quitar. + Identificador para el que se va a quitar una regla de auditoría. + Máscara de acceso de la regla que se va a quitar. + Marcas que especifican las propiedades de herencia para la regla que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla que se va a quitar. + + + Quita la regla de auditoría especificada del objeto actual.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado. + Es true si este método quita correctamente la regla de auditoría especificada; de lo contrario, es false. + Tipo de regla de auditoría que se va a quitar. + Identificador para el que se va a quitar una regla de auditoría. + Máscara de acceso de la regla que se va a quitar. + Marcas que especifican las propiedades de herencia para la regla que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla que se va a quitar. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + Identidad de la clase de objetos a los que se aplica la regla de control de auditoría quitada. + Identidad de la clase de objetos secundarios que pueden heredar la regla de auditoría quitada. + + + Quita la regla de auditoría especificada del objeto actual. + Es true si este método quita correctamente la regla de auditoría especificada; de lo contrario, es false. + Identificador para el que se va a quitar una regla de auditoría. + Identificador para el que se va a quitar una regla de auditoría. + + + Quita la regla de auditoría especificada del objeto actual. + Tipo de regla de auditoría que se va a quitar. + Identificador para el que se va a quitar una regla de auditoría. + Máscara de acceso de la regla que se va a quitar. + Marcas que especifican las propiedades de herencia para la regla que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla que se va a quitar. + + + Quita la regla de auditoría especificada del objeto actual.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado. + Tipo de regla de auditoría que se va a quitar. + Identificador para el que se va a quitar una regla de auditoría. + Máscara de acceso de la regla que se va a quitar. + Marcas que especifican las propiedades de herencia para la regla que se va a quitar. + Marcas que especifican las propiedades de propagación de herencia para la regla que se va a quitar. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + Identidad de la clase de objetos a los que se aplica la regla de control de auditoría quitada. + Identidad de la clase de objetos secundarios que pueden heredar la regla de auditoría quitada. + + + Quita la regla de auditoría especificada del objeto actual. + Identificador para el que se va a quitar una regla de auditoría. + El de la regla que se va a quitar. + + + Establece la regla de auditoría indicada para el objeto especificado. + Condición de auditoría que se va a establecer. + Identificador para el que se va a establecer una regla de auditoría. + Máscara de acceso para la nueva regla de auditoría. + Marcas que especifican las propiedades de herencia de la nueva regla de auditoría. + Marcas que especifican las propiedades de propagación de herencia para la nueva regla de auditoría. + + + Establece la regla de auditoría indicada para el objeto especificado.Use este método para las listas de control de acceso (ACL) de objetos de directorio cuando especifique el tipo de objeto o el tipo de objeto heredado. + Condición de auditoría que se va a establecer. + Identificador para el que se va a establecer una regla de auditoría. + Máscara de acceso para la nueva regla de auditoría. + Marcas que especifican las propiedades de herencia de la nueva regla de auditoría. + Marcas que especifican las propiedades de propagación de herencia para la nueva regla de auditoría. + Marcadores que especifican si los parámetros e contienen valores distintos de null. + La identidad de la clase de objetos a los que se aplica la nueva regla de auditoría. + La identidad de la clase de objetos secundarios que pueden heredar la nueva regla de auditoría. + + + Establece la regla de auditoría indicada para el objeto especificado. + Identificador para el que se va a establecer una regla de auditoría. + Identificador para el que se va a establecer una regla de auditoría. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/fr/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/fr/System.Security.AccessControl.xml new file mode 100644 index 0000000..2dd731b --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/fr/System.Security.AccessControl.xml @@ -0,0 +1,1979 @@ + + + + System.Security.AccessControl + + + + Spécifie les actions autorisées avec les objets sécurisables. + + + Spécifie un accès en écriture seule. + + + Ne spécifie aucun accès. + + + Spécifie un accès en lecture seule. + + + Spécifie le type de modification de contrôle d'accès à effectuer.Cette énumération est utilisée par les méthodes de la classe et ses descendants. + + + Ajoute la règle d'autorisation spécifiée à la liste de contrôle d'accès. + + + Supprime les règles d'autorisation qui contiennent les mêmes identificateur de sécurité et masque d'accès que la règle d'autorisation spécifiée dans la liste de contrôle d'accès. + + + Supprime les règles d'autorisation qui contiennent le même identificateur de sécurité que la règle d'autorisation spécifiée dans la liste de contrôle d'accès. + + + Supprime les règles d'autorisation qui correspondent exactement à la règle d'autorisation spécifiée dans la liste de contrôle d'accès. + + + Supprime les règles d'autorisation qui contiennent le même identificateur de sécurité que la règle d'autorisation spécifiée dans la liste de contrôle d'accès, puis ajoute la règle d'autorisation spécifiée à cette liste. + + + Supprime toutes les règles d'autorisation de la liste de contrôle d'accès, puis ajoute la règle d'autorisation spécifiée à cette liste. + + + Spécifie quelles sections d'un descripteur de sécurité enregistrer ou charger. + + + Liste de contrôle d'accès discrétionnaire. + + + Descripteur de sécurité entier. + + + Liste de contrôle d'accès système. + + + Groupe principal. + + + Aucune section. + + + Propriétaire. + + + Spécifie si un objet est utilisé pour autoriser ou refuser l'accès.Ces valeurs ne sont pas des indicateurs et elles ne peuvent pas être combinées. + + + L'objet sert à autoriser l'accès à un objet sécurisé. + + + L'objet sert à refuser l'accès à un objet sécurisé. + + + Représente une combinaison entre identité d'un utilisateur, masque d'accès et type de contrôle d'accès (autorisation ou refus).Un objet contient également des informations relatives à la façon dont les objets enfants héritent de la règle et dont cet héritage est propagé. + + + Initialise une nouvelle instance de la classe à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique.Ce paramètre doit désigner un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true si cette règle est héritée d'un conteneur parent. + Propriétés d'héritage de la règle d'accès. + Indique si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Type de contrôle d'accès valide. + La valeur du paramètre ne peut pas être castée en tant que ou le paramètre contient une valeur non valide. + Le paramètre a la valeur zéro ou les paramètres ou contiennent des valeurs d'indicateur non reconnues. + + + Obtient la valeur associée à cet objet . + Valeur associée à cet objet . + + + Représente une combinaison entre identité d'un utilisateur, masque d'accès et type de contrôle d'accès (autorisation ou refus).Un objet AccessRule`1 contient également des informations relatives à la façon dont les objets enfants héritent de la règle et dont cet héritage est propagé. + Type de droits d'accès pour la règle d'accès. + + + Initialise une nouvelle instance de la classe AccessRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. + Droits de la règle d'accès. + Type de contrôle d'accès valide. + + + Initialise une nouvelle instance de la classe AccessRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. + Droits de la règle d'accès. + Propriétés d'héritage de la règle d'accès. + Indique si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Type de contrôle d'accès valide. + + + Initialise une nouvelle instance de la classe AccessRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. + Droits de la règle d'accès. + Type de contrôle d'accès valide. + + + Initialise une nouvelle instance de la classe AccessRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. + Droits de la règle d'accès. + Propriétés d'héritage de la règle d'accès. + Indique si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Type de contrôle d'accès valide. + + + Obtient les droits de l'instance actuelle. + Droits, castés en tant que type <T>, de l'instance actuelle. + + + Donne la possibilité d'itérer au sein des entrées d'une liste de contrôle d'accès (ACL). + + + Obtient l'élément en cours dans la collection .Cette propriété obtient la version de type convivial de l'objet. + Élément en cours dans la collection . + + + Avance l'énumérateur à l'élément suivant de la collection . + true si l'énumérateur a pu avancer jusqu'à l'élément suivant ; false si l'énumérateur a dépassé la fin de la collection. + La collection a été modifiée après la création de l'énumérateur. + + + Rétablit l'énumérateur à sa position initiale, qui précède le premier élément de la collection . + La collection a été modifiée après la création de l'énumérateur. + + + + Spécifie le comportement, en matière d'héritage et d'audit, d'une entrée du contrôle d'accès. + + + Toutes les tentatives d'accès sont auditées. + + + Le masque d'accès est propagé aux objets conteneurs enfants. + + + Les échecs de tentatives d'accès sont audités. + + + OR logique de , , et . + + + Une entrée du contrôle d'accès est héritée d'un conteneur parent plutôt que définie explicitement pour un objet. + + + Le masque d'accès ne se propage qu'aux objets enfants.Les objets enfants sont des objets conteneurs et descendants. + + + Aucun indicateur d'entrée du contrôle d'accès n'est défini. + + + Les vérifications d'accès ne s'appliquent pas à l'objet ; elles ne s'appliquent qu'à ses enfants. + + + Le masque d'accès se propage sur les objets enfants descendants. + + + Les tentatives d'accès réussies sont auditées. + + + Spécifie la fonction d'une entrée du contrôle d'accès. + + + Autorise l'accès. + + + Refuse l'accès. + + + Provoque une alerte système. + + + Provoque un audit système. + + + Définit les types d'entrées du contrôle d'accès disponibles. + + + Autorise un client approuvé spécifique identifié par un objet à accéder à un objet. + + + Autorise un client approuvé spécifique identifié par un objet à accéder à un objet.Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Autorise l'accès à un objet, un jeu de propriétés ou une propriété.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet et un objet qui identifie le client approuvé à qui le système accorde l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée.Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Défini mais jamais utilisé.Inclus ici par souci d'intégrité. + + + Autorise l'accès à un objet, un jeu de propriétés ou une propriété.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet et un objet qui identifie le client approuvé à qui le système accorde l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée. + + + Refuse à un client approuvé spécifique, identifié par un objet , l'accès à un objet. + + + Refuse à un client approuvé spécifique, identifié par un objet , l'accès à un objet.Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Refuse l'accès à un objet, un jeu de propriétés ou une propriété.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet et un objet qui identifie le client approuvé à qui le système accorde l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée.Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Refuse l'accès à un objet, un jeu de propriétés ou une propriété.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet et un objet qui identifie le client approuvé à qui le système accorde l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée. + + + Suit le type d'entrée du contrôle d'accès maximal de l'énumération. + + + Réservé à une utilisation future. + + + Réservé à une utilisation future. + + + Réservé à une utilisation future. + + + Réservé à une utilisation future. + + + Enregistre un message d'audit lorsqu'un client approuvé spécifié tente un accès à un objet.Le client approuvé est identifié par un objet . + + + Enregistre un message d'audit lorsqu'un client approuvé spécifié tente un accès à un objet.Le client approuvé est identifié par un objet .Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Enregistre un message d'audit lorsqu'un client approuvé spécifié tente un accès à un objet ou à des sous-objets, tels que des jeux de propriétés ou propriétés.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet ou sous-objet et un objet qui identifie le client approuvé pour qui le système audite l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée.Ce type d'entrée du contrôle d'accès peut contenir des données de rappel facultatives.Les données de rappel représentent un BLOB, spécifique au gestionnaire des ressources, non interprété. + + + Enregistre un message d'audit lorsqu'un client approuvé spécifié tente un accès à un objet ou à des sous-objets, tels que des jeux de propriétés ou propriétés.L'entrée du contrôle d'accès contient un jeu de droits d'accès, un GUID qui identifie le type d'objet ou sous-objet et un objet qui identifie le client approuvé pour qui le système audite l'accès.L'entrée du contrôle d'accès contient également un GUID et un jeu d'indicateurs qui contrôlent la façon dont les objets enfants héritent de cette entrée. + + + Spécifie les conditions dans lesquelles l'audit tente d'accéder à un objet sécurisable. + + + Les échecs des tentatives d'accès sont à auditer. + + + Aucune tentative d'accès n'est à auditer. + + + Les tentatives d'accès réussies sont à auditer. + + + Représente une combinaison entre identité d'un utilisateur et masque d'accès.Un objet contient également des informations sur la façon dont les objets enfants héritent de la règle, sur la façon dont cet héritage est propagé et les conditions gouvernant à l'audit. + + + Initialise une nouvelle instance de la classe à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'audit s'applique.Il doit s'agir d'un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true pour hériter de cette règle à partir d'un conteneur parent. + Propriétés d'héritage de la règle d'audit. + Indique si les règles d'audit héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Conditions gouvernant à l'audit de la règle. + La valeur du paramètre ne peut pas être castée en tant que ou le paramètre contient une valeur non valide. + Le paramètre a la valeur zéro ou les paramètres ou contiennent des valeurs d'indicateur non reconnues. + + + Obtient les indicateurs d'audit de cette règle d'audit. + Combinaison d'opérations de bits des valeurs d'énumération.Cette combinaison spécifie les conditions d'audit de cette règle d'audit. + + + Représente une combinaison entre identité d'un utilisateur et masque d'accès. + + + + Initialise une nouvelle instance de la classe AuditRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle cette règle d'audit s'applique. + Droits de la règle d'audit. + Conditions gouvernant à l'audit de la règle. + + + Initialise une nouvelle instance de la classe AuditRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'audit s'applique. + Droits de la règle d'audit. + Propriétés d'héritage de la règle d'audit. + Indique si les règles d'audit héritées sont automatiquement propagées. + Conditions gouvernant à l'audit de la règle. + + + Initialise une nouvelle instance de la classe AuditRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'audit s'applique. + Droits de la règle d'audit. + Propriétés de la règle d'audit. + + + Initialise une nouvelle instance de la classe AuditRule'1 à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'audit s'applique. + Droits de la règle d'audit. + Propriétés d'héritage de la règle d'audit. + Indique si les règles d'audit héritées sont automatiquement propagées. + Conditions gouvernant à l'audit de la règle. + + + Droits de la règle d'audit. + retourne  ; + + + Détermine l'accès aux objets sécurisables.Les classes dérivées et permettent de spécialiser les fonctionnalités d'accès et d'audit. + + + Initialise une nouvelle instance de la classe à l'aide des valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. Ce paramètre doit désigner un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true pour hériter de cette règle à partir d'un conteneur parent. + Propriétés d'héritage de la règle d'accès. + Indique si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + La valeur du paramètre ne peut pas être castée en tant que . + Le paramètre a la valeur zéro ou les paramètres ou contiennent des valeurs d'indicateur non reconnues. + + + Obtient le masque d'accès de cette règle. + Masque d'accès de cette règle. + + + Obtient auquel cette règle s'applique. + + auquel cette règle s'applique. + + + Obtient la valeur des indicateurs qui déterminent la façon dont les objets enfants héritent de cette règle. + Combinaison d'opérations de bits des valeurs d'énumération. + + + Obtient une valeur qui indique si cette règle est établie explicitement ou si elle est héritée d'un objet conteneur parent. + true si cette règle n'est pas établie explicitement mais héritée d'un conteneur parent. + + + Obtient la valeur des indicateurs de propagation, qui déterminent la façon dont l'héritage de cette règle se propage aux objets enfants.Cette propriété n'a de lieu d'être que si la valeur de l'énumération n'est pas . + Combinaison d'opérations de bits des valeurs d'énumération. + + + Représente une collection d'objets . + + + Initialise une nouvelle instance de la classe . + + + Ajoute un objet à la collection. + Objet à ajouter à la collection. + + + Copie le contenu de la collection dans un tableau. + Tableau dans lequel copier le contenu de la collection. + Index de base zéro à partir duquel commencer la copie. + + + + Obtient l'objet à l'index spécifié dans la collection. + Objet à l'index spécifié. + Index de base zéro de l'objet à obtenir. + + + + + + + Représente une entrée du contrôle d'accès. + + + Initialise une nouvelle instance de la classe . + Indicateurs qui spécifient des informations relatives à l'héritage, à la propagation d'héritage et aux conditions d'audit de la nouvelle entrée du contrôle d'accès. + Utilisation de la nouvelle entrée du contrôle d'accès. + Masque d'accès de l'entrée du contrôle d'accès. + + associé à la nouvelle entrée du contrôle d'accès. + true pour spécifier que la nouvelle entrée du contrôle d'accès est de type rappel. + Données opaques associées à la nouvelle entrée du contrôle d'accès.Les données opaques ne sont autorisées que dans les entrées du contrôle d'accès de type rappel.Ce tableau ne doit pas avoir une longueur supérieure à la valeur de retour de la méthode . + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Utilisez cette durée avec la méthode avant de marshaler l'entrée du contrôle d'accès dans un tableau binaire. + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de l'objet est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans le tableau . + + + Obtient la longueur maximale autorisée d'un blob de données opaque pour les entrées du contrôle d'accès de type rappel. + Longueur autorisée d'un objet BLOB de données opaque. + true pour spécifier que l'objet est une entrée du contrôle d'accès de type rappel. + + + Représente une liste de contrôle d'accès et constitue la classe de base des classes et . + + + Obtient la longueur, en octets, de la représentation binaire de l'objet actuel.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet actuel. + + + Obtient le nombre d'entrées du contrôle d'accès dans l'objet actuel. + Nombre d'entrées du contrôle d'accès dans l'objet actuel. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + + Obtient une valeur booléenne qui spécifie si les entrées du contrôle d'accès de l'objet actuel suivent un ordre canonique. + true si les entrées du contrôle d'accès de l'objet actuel suivent un ordre canonique ; sinon, false. + + + Définit si l'objet est un conteneur. + true si l'objet actuel est un conteneur. + + + Définit si l'objet actuel est une liste de contrôle d'accès d'objets d'annuaire. + true si l'objet actuel est une liste de contrôle d'accès d'objets d'annuaire. + + + Obtient ou définit le à l'index spécifié. + Objet à l'index spécifié. + Index de base zéro du à obtenir ou définir. + + + Supprime toutes les entrées du contrôle d'accès contenues par cet objet et associées à l'objet spécifié. + Objet à vérifier. + + + Supprime toutes les entrées du contrôle d'accès héritées de cet objet . + + + Obtient le niveau de révision de . + Valeur d'octet qui spécifie le niveau de révision de . + + + Contrôle l'accès aux objets sans manipulation directe de listes de contrôle d'accès.Cette classe est la classe de base abstraite de la classe . + + + Initialise une nouvelle instance de la classe . + true si le nouvel objet est un objet conteneur. + + + Ajoute la règle d'accès spécifiée à la liste de contrôle d'accès discrétionnaire associée à cet objet . + Règle d'accès à ajouter. + + + Ajoute la règle d'audit spécifiée à la liste de contrôle d'accès système associée à cet objet . + Règle d'audit à ajouter. + + + Obtient une collection des règles d'accès associées à l'identificateur de sécurité spécifié. + Collection des règles d'accès associées à l'objet spécifié. + true pour inclure des règles d'accès définies explicitement pour l'objet. + true pour inclure des règles d'accès héritées. + Spécifie si l'identificateur de sécurité pour lequel récupérer les règles d'accès est de type T:System.Security.Principal.SecurityIdentifier ou T:System.Security.Principal.NTAccount.La valeur de ce paramètre doit être un type qui peut être traduit vers le type . + + + + + + Obtient une collection des règles d'audit associées à l'identificateur de sécurité spécifié. + Collection des règles d'audit associées à l'objet spécifié. + true pour inclure des règles d'audit définies explicitement pour l'objet. + true pour inclure des règles d'audit héritées. + Identificateur de sécurité pour lequel récupérer des règles d'audit.Il doit s'agir d'un objet pouvant être casté en tant qu'objet . + + + + + + Applique la modification spécifiée à la liste de contrôle d'accès discrétionnaire associée à cet objet . + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès discrétionnaire. + Règle d'accès à modifier. + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + + + Applique la modification spécifiée à la liste de contrôle d'accès système associée à cet objet . + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès système. + Règle d'audit à modifier. + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + + + Supprime les règles d'accès qui contiennent les mêmes identificateur de sécurité et masque d'accès que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet . + true si la suppression de la règle d'accès a réussi ; sinon, false. + Règle d'accès à supprimer. + + + Supprime toutes les règles d'accès qui ont le même identificateur de sécurité que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet . + Règle d'accès à supprimer. + + + Supprime toutes les règles d'accès qui correspondent exactement à la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet . + Règle d'accès à supprimer. + + + Supprime les règles d'audit qui contiennent les mêmes identificateur de sécurité et masque d'accès que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet . + true si la suppression de la règle d'audit a réussi ; sinon, false. + Règle d'audit à supprimer. + + + Supprime toutes les règles d'audit qui ont le même identificateur de sécurité que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet . + Règle d'audit à supprimer. + + + Supprime toutes les règles d'audit qui correspondent exactement à la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet . + Règle d'audit à supprimer. + + + Supprime toutes les règles d'accès de la liste de contrôle d'accès discrétionnaire associée à cet objet , puis ajoute la règle d'accès spécifiée. + Règle d'accès à réinitialiser. + + + Supprime toutes les règles d'accès qui contiennent les mêmes identificateur de sécurité et qualificateur que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet , puis ajoute la règle d'accès spécifiée. + Règle d'accès à définir. + + + Supprime toutes les règles d'audit qui contiennent les mêmes identificateur de sécurité et qualificateur que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet , puis ajoute la règle d'audit spécifiée. + Règle d'audit à définir. + + + Représente un descripteur de sécurité.Un descripteur de sécurité comprend un propriétaire, un groupe principal, une liste de contrôle d'accès discrétionnaire et une liste de contrôle d'accès système. + + + Initialise une nouvelle instance de la classe à partir du tableau spécifié de valeurs exprimées en octets. + true si le nouveau descripteur de sécurité est associé à un objet conteneur. + true si le nouveau descripteur de sécurité est associé à un objet annuaire. + Tableau de valeurs, en octets, à partir duquel créer le nouvel objet . + Dans le tableau , offset auquel commencer la copie. + + + Initialise une nouvelle instance de la classe à partir des informations spécifiées. + true si le nouveau descripteur de sécurité est associé à un objet conteneur. + true si le nouveau descripteur de sécurité est associé à un objet annuaire. + Indicateurs qui spécifient le comportement du nouvel objet . + Propriétaire du nouvel objet . + Groupe principal du nouvel objet . + Liste de contrôle d'accès système du nouvel objet . + Liste de contrôle d'accès discrétionnaire du nouvel objet . + + + Initialise une nouvelle instance de la classe à partir de l'objet spécifié. + true si le nouveau descripteur de sécurité est associé à un objet conteneur. + true si le nouveau descripteur de sécurité est associé à un objet annuaire. + Objet à partir duquel créer le nouvel objet . + + + Initialise une nouvelle instance de la classe à partir de la chaîne SDDL spécifiée. + true si le nouveau descripteur de sécurité est associé à un objet conteneur. + true si le nouveau descripteur de sécurité est associé à un objet annuaire. + Chaîne SDDL à partir de laquelle créer le nouvel objet . + + + Définit les propriété pour ce instance et définit les indicateur. + Niveau de révision du nouvel objet . + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Définit les propriété pour ce instance et définit les indicateur. + Niveau de révision du nouvel objet . + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Obtient des valeurs qui spécifient le comportement de l'objet . + Une ou plusieurs valeurs de l'énumération associées par une opération OR logique. + + + Obtient ou définit la liste de contrôle d'accès discrétionnaire de cet objet .La liste de contrôle d'accès discrétionnaire contient des règles d'accès. + Liste de contrôle d'accès discrétionnaire de cet objet . + + + Obtient ou définit le groupe principal de cet objet . + Groupe principal de cet objet . + + + Obtient une valeur booléenne qui spécifie si l'objet associé à cet objet est un objet conteneur. + true si l'objet associé à cet objet est un objet conteneur ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si la liste de contrôle d'accès discrétionnaire associée à cet objet suit un ordre canonique. + true si la liste de contrôle d'accès discrétionnaire associée à cet objet suit un ordre canonique ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si l'objet associé à cet objet est un objet annuaire. + true si l'objet associé à cet objet est un objet annuaire ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si la liste de contrôle d'accès système associée à cet objet suit un ordre canonique. + true si la liste de contrôle d'accès système associée à cet objet suit un ordre canonique ; sinon, false. + + + Obtient ou définit le propriétaire de l'objet associé à cet objet . + Propriétaire de l'objet associé à cet objet . + + + Supprime toutes les règles d'accès de l'identificateur de sécurité spécifié dans la liste de contrôle d'accès discrétionnaire associée à cet objet . + Identificateur de sécurité pour lequel supprimer des règles d'accès. + + + Supprime toutes les règles d'audit de l'identificateur de sécurité spécifié dans la liste de contrôle d'accès système associée à cet objet . + Identificateur de sécurité pour lequel supprimer des règles d'audit. + + + Définit la protection héritée par la liste de contrôle d'accès discrétionnaire associée à cet objet .Les listes de contrôle d'accès discrétionnaires protégées n'héritent pas des règles d'accès des conteneurs parents. + true pour que la liste de contrôle d'accès discrétionnaire ne reçoive pas d'héritage. + true pour conserver dans la liste de contrôle d'accès discrétionnaire les règles d'accès héritées ; false pour supprimer de la liste les règles d'accès héritées. + + + Définit la protection héritée par la liste de contrôle d'accès système associée à cet objet .Les listes de contrôle d'accès système protégées n'héritent pas des règles d'audit des conteneurs parents. + true pour que la liste de contrôle d'accès système ne reçoive pas d'héritage. + true pour conserver dans la liste de contrôle d'accès système les règles d'audit héritées ; false pour supprimer de la liste les règles d'audit héritées. + + + Obtient ou définit la liste de contrôle d'accès système de cet objet .La liste de contrôle d'accès système contient des règles d'audit. + Liste de contrôle d'accès système de cet objet . + + + Représente une entrée composée du contrôle d'accès. + + + Initialise une nouvelle instance de la classe . + Contient des indicateurs qui spécifient des informations relatives à l'héritage, la propagation d'héritage et les conditions d'audit de la nouvelle entrée du contrôle d'accès. + Masque d'accès de l'entrée du contrôle d'accès. + Valeur d'énumération . + + associé à la nouvelle entrée du contrôle d'accès. + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Obtient ou définit le type de cet objet . + Type de cet objet . + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Spécifie le type d'un objet . + + + L'objet est utilisé pour l'emprunt d'identité. + + + Ces indicateurs affectent le comportement du descripteur de sécurité. + + + Spécifie que la liste de contrôle d'accès discrétionnaire est automatiquement héritée du parent.Défini uniquement par les gestionnaires des ressources. + + + Ignoré. + + + Spécifie que la liste de contrôle d'accès discrétionnaire a été obtenue par un mécanisme par défaut.Défini uniquement par les gestionnaires des ressources. + + + Spécifie que la liste de contrôle d'accès discrétionnaire n'est pas null.Défini par les gestionnaires des ressources ou les utilisateurs. + + + Spécifie que le gestionnaire des ressources empêche l'héritage automatique.Défini par les gestionnaires des ressources ou les utilisateurs. + + + Ignoré. + + + Spécifie que le de groupe a été obtenu par un mécanisme par défaut.Défini uniquement par les gestionnaires des ressources ; ne doit pas être défini par les appelants. + + + Aucun indicateur de contrôle. + + + Spécifie que le du propriétaire a été obtenu par un mécanisme par défaut.Défini uniquement par les gestionnaires des ressources ; ne doit pas être défini par les appelants. + + + Spécifie que le contenu du champ Réservé est valide. + + + Spécifie que la représentation binaire du descripteur de sécurité est au format auto-relatif. Cet indicateur est toujours défini. + + + Ignoré. + + + Spécifie que la liste de contrôle d'accès système est automatiquement héritée du parent.Défini uniquement par les gestionnaires des ressources. + + + Ignoré. + + + Spécifie que la liste de contrôle d'accès système a été obtenue par un mécanisme par défaut.Défini uniquement par les gestionnaires des ressources. + + + Spécifie que la liste de contrôle d'accès système n'est pas null.Défini par les gestionnaires des ressources ou les utilisateurs. + + + Spécifie que le gestionnaire des ressources empêche l'héritage automatique.Défini par les gestionnaires des ressources ou les utilisateurs. + + + Représente une entrée non définie du contrôle d'accès par l'un des membres de l'énumération . + + + Initialise une nouvelle instance de la classe . + Type de la nouvelle entrée du contrôle d'accès.Cette valeur doit être supérieure à . + Indicateurs donnant des informations sur l'héritage, la propagation d'héritage et les conditions d'audit de la nouvelle entrée du contrôle d'accès. + Tableau des valeurs d'octet qui contient les données de la nouvelle entrée du contrôle d'accès.Cette valeur peut être null.La longueur de ce tableau ne doit pas être supérieure à la valeur du champ et doit être un multiple de quatre. + La valeur du paramètre de n'est pas supérieure à ou la longueur du tableau est supérieure à la valeur du champ ou différente d'un multiple de quatre. + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Retourne les données opaques associées à cet objet . + Tableau des valeurs d'octet qui représente les données opaques associées à cet objet . + + + Retourne la longueur maximale autorisée d'un blob de données opaque pour cet objet . + + + Obtient la longueur des données opaques associées à cet objet . + Longueur des données de rappel opaques. + + + Définit les données de rappel opaques associées à cet objet . + Tableau de valeurs d'octet qui représente les données de rappel opaques de cet objet . + + + Représente une liste de contrôle d'accès discrétionnaire. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Niveau de révision du nouvel objet . + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées à partir de l'objet spécifié. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Objet sous-jacent du nouvel objet .Spécifiez null pour créer une liste de contrôle d'accès vide. + + + Ajoute une entrée du contrôle d'accès, avec les paramètres spécifiés, à l'objet en cours. + Type de contrôle d'accès (autorisation ou refus) à ajouter. + + pour lequel ajouter une entrée du contrôle d'accès. + Règle d'accès de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle entrée de contrôle d'accès. + + + Ajoute une entrée du contrôle d'accès, avec les paramètres spécifiés, à l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité pour la nouvelle entrée de contrôle d'accès. + Type de contrôle d'accès (autorisation ou refus) à ajouter. + + pour lequel ajouter une entrée du contrôle d'accès. + Règle d'accès de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la nouvelle entrée de contrôle d'accès s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la nouvelle entrée de contrôle d'accès. + + + Ajoute une entrée du contrôle d'accès, avec les paramètres spécifiés, à l'objet en cours. + Type de contrôle d'accès (autorisation ou refus) à ajouter. + + pour lequel ajouter une entrée du contrôle d'accès. + Le pour l'accès à nouveau. + + + Supprime la règle de contrôle d'accès spécifiée de l'objet en cours. + true si cette méthode réussit à supprimer l'accès spécifié ; sinon, false. + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une règle de contrôle d'accès. + Masque d'accès de la règle à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle à supprimer. + + + Supprime la règle de contrôle d'accès spécifiée de l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité. + true si cette méthode réussit à supprimer l'accès spécifié ; sinon, false. + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une règle de contrôle d'accès. + Masque d'accès de la règle de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle de contrôle d'accès à supprimer. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe d'objets auxquels la règle de contrôle d'accès supprimée s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la règle de contrôle d'accès supprimée. + + + Supprime la règle de contrôle d'accès spécifiée de l'objet en cours. + Retourne . + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une règle de contrôle d'accès. + Le pour laquelle supprimer l'accès. + + + Supprime l'entrée du contrôle d'accès spécifiée de l'objet en cours. + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une entrée du contrôle d'accès. + Masque d'accès de l'entrée de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de l'entrée de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de l'entrée de contrôle d'accès à supprimer. + + + Supprime l'entrée du contrôle d'accès spécifiée de l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité pour l'entrée de contrôle d'accès à supprimer. + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une entrée du contrôle d'accès. + Masque d'accès de l'entrée de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de l'entrée de contrôle d'accès à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de l'entrée de contrôle d'accès à supprimer. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe d'objets à laquelle l'entrée de contrôle d'accès supprimée s'applique. + Identité de la classe des objets enfants qui peuvent hériter de l'entrée de contrôle d'accès supprimée. + + + Supprime l'entrée du contrôle d'accès spécifiée de l'objet en cours. + Type de contrôle d'accès (autorisation ou refus) à supprimer. + + pour lequel supprimer une entrée du contrôle d'accès. + Le pour laquelle supprimer l'accès. + + + Définit le contrôle d'accès spécifié pour l'objet spécifié. + Type de contrôle d'accès (autorisation ou refus) à définir. + + pour lequel définir une entrée du contrôle d'accès. + Règle d'accès de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle entrée de contrôle d'accès. + + + Définit le contrôle d'accès spécifié pour l'objet spécifié. + Type de contrôle d'accès (autorisation ou refus) à définir. + + pour lequel définir une entrée du contrôle d'accès. + Règle d'accès de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle entrée de contrôle d'accès. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la nouvelle entrée de contrôle d'accès s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la nouvelle entrée de contrôle d'accès. + + + Définit le contrôle d'accès spécifié pour l'objet spécifié. + Type de contrôle d'accès (autorisation ou refus) à définir. + + pour lequel définir une entrée du contrôle d'accès. + Le pour lequel vous configurez l'accès. + + + Représente une entrée du contrôle d'accès ; classe de base de toutes les autres classes d'entrées du contrôle d'accès. + + + Obtient ou définit les associés à cet objet . + + associés à cet objet . + + + Obtient le type de cette entrée du contrôle d'accès. + Type de cette entrée du contrôle d'accès. + + + Obtient les informations d'audit associées à cette entrée du contrôle d'accès. + Informations d'audit associées à cette entrée du contrôle d'accès. + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Crée une copie complète de cette entrée du contrôle d'accès. + Objet créé par cette méthode. + + + Crée un objet à partir des données binaires spécifiées. + Objet créé par cette méthode. + Données binaires à partir desquelles créer le nouvel objet . + Offset auquel commencer l'unmarshaling. + + + Détermine si l'objet spécifié est égal à l'objet en cours. + true si l'objet spécifié est égal à l'objet en cours ; sinon false. + Objet à comparer à l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Sert de fonction de hachage pour la classe .La méthode peut être utilisée dans des algorithmes de hachage et des structures de données telles qu'une table de hachage. + Code de hachage pour l'objet actuel. + + + Obtient des indicateurs qui spécifient les propriétés d'héritage de cette entrée du contrôle d'accès. + Indicateurs qui spécifient les propriétés d'héritage de cette entrée du contrôle d'accès. + + + Obtient une valeur booléenne qui spécifie si cette entrée du contrôle d'accès est héritée ou définie explicitement. + true si cette entrée du contrôle d'accès est héritée ; sinon false. + + + Détermine si les objets spécifiés sont considérés comme égaux. + true si les deux objets sont égaux ; sinon, false. + Premier objet à comparer. + Deuxième à comparer. + + + Détermine si les objets spécifiés sont considérés comme inégaux. + true si les deux objets sont inégaux ; sinon, false. + Premier objet à comparer. + Deuxième à comparer. + + + Obtient des indicateurs qui spécifient les propriétés de propagation d'héritage de cette entrée du contrôle d'accès. + Indicateurs qui spécifient les propriétés de propagation d'héritage de cette entrée du contrôle d'accès. + + + Représente une liste de contrôle d'accès (ACL) et constitue la classe de base des classes , , et . + + + Initialise une nouvelle instance de la classe . + + + Niveau de révision de l'objet en cours.Cette valeur est retournée par la propriété des listes de contrôle d'accès non associées aux objets Services d'annuaire. + + + Niveau de révision de l'objet en cours.Cette valeur est retournée par la propriété des listes de contrôle d'accès associées aux objets Services d'annuaire. + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès (ACL) dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Copie chaque du en cours vers le tableau spécifié. + Tableau dans lequel les copies des objets contenus par le en cours sont placées. + Index de base zéro du auquel la copie commence. + + + Obtient le nombre d'entrées du contrôle d'accès dans l'objet en cours. + Nombre d'entrées du contrôle d'accès dans l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Retourne une nouvelle instance de la classe . + + retourné par cette méthode. + + + La propriété a toujours la valeur false.Son implémentation est requise pour l'implémentation de l'interface . + Toujours false. + + + Obtient ou définit à l'index spécifié. + + à l'index spécifié. + Index de base zéro du à obtenir ou définir. + + + Longueur binaire maximale autorisée d'un objet . + + + Obtient le niveau de révision de . + Valeur d'octet qui spécifie le niveau de révision de . + + + Cette propriété retourne toujours null.Son implémentation est requise pour l'implémentation de l'interface . + Retourne toujours null. + + + Copie chaque du en cours vers le tableau spécifié. + Tableau dans lequel les copies des objets contenus par le en cours sont placées. + Index de base zéro du auquel la copie commence. + + + Retourne une nouvelle instance de la classe castée en instance de l'interface . + Nouvel objet , casté en instance de l'interface . + + + Représente un descripteur de sécurité.Un descripteur de sécurité inclut un propriétaire, un groupe principal, une liste de contrôle d'accès discrétionnaire et une liste de contrôle d'accès système. + + + Initialise une nouvelle instance de la classe . + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Obtient des valeurs qui spécifient le comportement de l'objet . + Une ou plusieurs valeurs de l'énumération associées par une opération OR logique. + + + Retourne un tableau de valeurs d'octets, qui représente les informations contenues dans cet objet . + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Retourne la représentation en SDDL, langage de définition des descripteurs de sécurité, des sections spécifiées du descripteur de sécurité que cet objet représente. + Représentation SDDL des sections spécifiées du descripteur de sécurité associé à cet objet . + Spécifie quelles sections (règles d'accès, règles d'audit, groupe principal, propriétaire) du descripteur de sécurité obtenir. + + + Obtient ou définit le groupe principal de cet objet . + Groupe principal de cet objet . + + + Retourne une valeur booléenne qui spécifie si le descripteur de sécurité associé à cet objet peut être converti au format SDDL. + true si le descripteur de sécurité associé à cet objet peut être converti au format SDDL ; sinon false. + + + Obtient ou définit le propriétaire de l'objet associé à cet objet . + Propriétaire de l'objet associé à cet objet . + + + Obtient le numéro de révision de l'objet . + Valeur d'octet qui spécifie le niveau de révision du . + + + Les indicateurs d'héritage spécifient la sémantique d'héritage des entrées du contrôle d'accès. + + + Les objets conteneurs enfants héritent de l'entrée du contrôle d'accès. + + + Les objets enfants n'héritent pas de l'entrée du contrôle d'accès. + + + Les objets descendants du niveau enfant héritent de l'entrée du contrôle d'accès. + + + Encapsule tous les types d'entrées du contrôle d'accès actuellement définis par Microsoft Corporation.Tous les objets contiennent un masque d'accès de 32 bits et un objet . + + + Obtient ou définit le masque d'accès de cet objet . + Masque d'accès de cet objet . + + + Obtient ou définit l'objet associé à cet objet . + Objet associé à cet objet . + + + Donne la possibilité de contrôler l'accès aux objets natifs sans manipulation directe de listes de contrôle d'accès.Les types d'objets natifs sont définis par l'énumération . + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + Handle de l'objet sécurisable auquel le nouvel objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à inclure dans cet objet . + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + Handle de l'objet sécurisable auquel le nouvel objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à inclure dans cet objet . + Délégué implémenté par des intégrateurs et fournissant des exceptions personnalisées. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Initialise une nouvelle instance de la classe à l'aide des valeurs spécifiées. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + Délégué implémenté par des intégrateurs et fournissant des exceptions personnalisées. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + Nom de l'objet sécurisable auquel le nouvel objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à inclure dans cet objet . + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + true si le nouvel objet est un objet conteneur. + Type d'objet sécurisable auquel le nouvel objet est associé. + Nom de l'objet sécurisable auquel le nouvel objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à inclure dans cet objet . + Délégué implémenté par des intégrateurs et fournissant des exceptions personnalisées. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Handle de l'objet sécurisable auquel cet objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + L'objet sécurisable auquel cet objet est associé est un répertoire ou un fichier, et ce répertoire ou fichier est introuvable. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Handle de l'objet sécurisable auquel cet objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + L'objet sécurisable auquel cet objet est associé est un répertoire ou un fichier, et ce répertoire ou fichier est introuvable. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Nom de l'objet sécurisable auquel cet objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + L'objet sécurisable auquel cet objet est associé est un répertoire ou un fichier, et ce répertoire ou fichier est introuvable. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Nom de l'objet sécurisable auquel cet objet est associé. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + L'objet sécurisable auquel cet objet est associé est un répertoire ou un fichier, et ce répertoire ou fichier est introuvable. + + + Offre aux intégrateurs un moyen de mapper des codes d'erreur numériques aux exceptions spécifiques qu'ils créent. + + que ce délégué crée. + Code d'erreur numérique. + Nom de l'objet sécurisable auquel le nouvel objet est associé. + Handle de l'objet sécurisable auquel le nouvel objet est associé. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Représente une combinaison entre identité d'un utilisateur, masque d'accès et type de contrôle d'accès (autorisation ou refus).Un objet contient également des informations sur le type d'objet auquel la règle s'applique, le type d'objet enfant qui peut hériter de la règle, ainsi que la façon dont les objets enfants héritent de la règle et dont cet héritage est propagé. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + Identité à laquelle la règle d'accès s'applique. Il doit s'agir d'un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true si cette règle est héritée d'un conteneur parent. + Spécifie les propriétés d'héritage de la règle d'accès. + Spécifie si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Type d'objet auquel la règle s'applique. + Type d'objet enfant qui peut hériter de la règle. + Spécifie si cette règle accorde ou refuse l'accès. + La valeur du paramètre ne peut pas être castée en tant que ou le paramètre contient une valeur non valide. + Le paramètre a la valeur zéro ou les paramètres ou contiennent des valeurs d'indicateur non reconnues. + + + Obtient le type d'objet enfant qui peut hériter de l'objet . + Type d'objet enfant qui peut hériter de l'objet . + + + Obtient des indicateurs qui spécifient si les propriétés et de l'objet contiennent des valeurs valides. + + spécifie que la propriété contient une valeur valide. spécifie que la propriété contient une valeur valide.Ces valeurs peuvent être combinées avec un OR logique. + + + Obtient le type d'objet auquel s'applique. + Type d'objet auquel s'applique. + + + Contrôle l'accès aux objets Services d'annuaire.Cette classe représente une entrée du contrôle d'accès associée à un objet annuaire. + + + Initialise une instance de la classe . + Conditions d'héritage, de propagation d'héritage et d'audit de la nouvelle entrée du contrôle d'accès. + Utilisation de la nouvelle entrée du contrôle d'accès. + Masque d'accès de l'entrée du contrôle d'accès. + + associé à la nouvelle entrée du contrôle d'accès. + Indique si les paramètres et contiennent des GUID d'objets valides. + GUID qui identifie le type d'objet auquel la nouvelle entrée du contrôle d'accès s'applique. + GUID qui identifie le type d'objet qui peut hériter de la nouvelle entrée du contrôle d'accès. + true si la nouvelle entrée du contrôle d'accès est de type rappel. + Données opaques associées à la nouvelle entrée du contrôle d'accès.Cela n'est prévu que pour les entrées du contrôle d'accès de type rappel.Ce tableau ne doit pas avoir une longueur supérieure à la valeur de retour de la méthode . + Le paramètre qualificateur contient une valeur non valide ou la valeur du paramètre opaque a une longueur supérieure à la valeur de retour de la méthode . + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Obtient ou définit le GUID du type d'objet qui peut hériter de l'entrée du contrôle d'accès que cet objet représente. + GUID du type d'objet qui peut hériter de l'entrée du contrôle d'accès que cet objet représente. + + + Retourne la longueur maximale autorisée, en octets, d'un blob de données opaque pour les entrées du contrôle d'accès de type rappel. + Longueur maximale autorisée, en octets, d'un blob de données opaque pour les entrées du contrôle d'accès de type rappel. + True si est une entrée du contrôle d'accès de type rappel. + + + Obtient ou définit des indicateurs qui spécifient si les propriétés et contiennent des valeurs qui identifient des types d'objet valides. + Un ou plusieurs membres de l'énumération combinés avec une opération OR logique. + + + Obtient ou définit le GUID du type d'objet associé à cet objet . + GUID du type d'objet associé à cet objet . + + + Spécifie la présence de types d'objets pour les entrées du contrôle d'accès. + + + Type d'objet pouvant hériter de l'entrée du contrôle d'accès. + + + Aucun type d'objet n'est présent. + + + Le type d'objet associé à l'entrée du contrôle d'accès est présent. + + + Représente une combinaison entre l'identité d'un utilisateur, un masque d'accès et des conditions d'audit.Un objet contient également des informations sur le type d'objet auquel la règle s'applique, le type d'objet enfant qui peut hériter de la règle, ainsi que la façon dont les objets enfants héritent de la règle et dont cet héritage est propagé. + + + Initialise une nouvelle instance de la classe . + Identité à laquelle la règle d'accès s'applique. Il doit s'agir d'un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true si cette règle est héritée d'un conteneur parent. + Spécifie les propriétés d'héritage de la règle d'accès. + Indique si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Type d'objet auquel la règle s'applique. + Type d'objet enfant qui peut hériter de la règle. + Conditions de l'audit. + La valeur du paramètre ne peut pas être castée en tant que ou le paramètre contient une valeur non valide. + Le paramètre a la valeur zéro ou les paramètres ou contiennent des valeurs d'indicateur non reconnues. + + + Obtient le type d'objet enfant qui peut hériter de l'objet . + Type d'objet enfant qui peut hériter de l'objet . + + + Les propriétés et de l'objet contiennent des valeurs valides. + + spécifie que la propriété contient une valeur valide. spécifie que la propriété contient une valeur valide.Ces valeurs peuvent être combinées avec un OR logique. + + + Obtient le type d'objet auquel s'applique. + Type d'objet auquel s'applique. + + + Donne la possibilité de contrôler l'accès aux objets sans manipulation directe de listes de contrôle d'accès.Cette classe est la classe de base abstraite des classes et . + + + Initialise une nouvelle instance de la classe . + + + Initialise une nouvelle instance de la classe . + true si le nouvel objet est un objet conteneur. + True si le nouvel objet est un objet annuaire. + + + Initialise une nouvelle instance de la classe . + + de la nouvelle instance . + + + Obtient de l'objet sécurisable associé à cet objet . + Type de l'objet sécurisable associé à cet objet . + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + Objet créé par cette méthode. + Identité à laquelle la règle d'accès s'applique.Il doit s'agir d'un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + True si cette règle est héritée d'un conteneur parent. + Spécifie les propriétés d'héritage de la règle d'accès. + Spécifie si les règles d'accès héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Spécifie le type de contrôle d'accès valide. + + + Obtient ou définit une valeur booléenne qui spécifie si les règles d'accès associées à cet objet ont été modifiées. + true si les règles d'accès associées à cet objet ont été modifiées ; sinon, false. + + + Obtient de l'objet associé aux règles d'accès de cet objet .L'objet doit pouvoir être casté en objet . + Type de l'objet associé aux règles d'accès de cet objet . + + + Obtient une valeur booléenne qui spécifie si les règles d'accès associées à cet objet suivent un ordre canonique. + true si les règles d'accès suivent un ordre canonique ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si la liste de contrôle d'accès discrétionnaire associée à cet objet est protégée. + true si la liste est protégée ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si les règles d'audit associées à cet objet suivent un ordre canonique. + true si les règles d'audit suivent un ordre canonique ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si la liste de contrôle d'accès système associée à cet objet est protégée. + true si la liste est protégée ; sinon, false. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + Objet créé par cette méthode. + Identité à laquelle la règle d'audit s'applique.Il doit s'agir d'un objet pouvant être casté en tant que . + Masque d'accès de cette règle.Le masque d'accès est une collection 32 bits de bits anonymes, dont la signification est définie par les intégrateurs individuels. + true si cette règle est héritée d'un conteneur parent. + Spécifie les propriétés d'héritage de la règle d'audit. + Spécifie si les règles d'audit héritées sont automatiquement propagées.Les indicateurs de propagation sont ignorés si a la valeur . + Spécifie les conditions pour lesquelles la règle est auditée. + + + Obtient ou définit une valeur booléenne qui spécifie si les règles d'audit associées à cet objet ont été modifiées. + true si les règles d'audit associées à cet objet ont été modifiées ; sinon, false. + + + Obtient l'objet associé aux règles d'audit de cet objet .L'objet doit pouvoir être casté en objet . + Type de l'objet associé aux règles d'audit de cet objet . + + + Obtient le groupe principal associé au propriétaire spécifié. + Groupe principal associé au propriétaire spécifié. + Propriétaire pour lequel obtenir le groupe principal. + + + + + + Obtient le propriétaire associé au groupe principal spécifié. + Propriétaire associé au groupe spécifié. + Groupe principal pour lequel obtenir le propriétaire. + + + + + + Retourne un tableau de valeurs d'octets, qui représente les informations de descripteur de sécurité de cet objet . + Tableau de valeurs, en octets, qui représente le descripteur de sécurité de cet objet .Cette méthode retourne null s'il n'y a pas d'informations sur la sécurité dans cet objet . + + + Retourne la représentation en SDDL, langage de définition des descripteurs de sécurité, des sections spécifiées du descripteur de sécurité associé à cet objet . + Représentation SDDL des sections spécifiées du descripteur de sécurité associé à cet objet . + Spécifie quelles sections (règles d'accès, règles d'audit, groupe principal, propriétaire) du descripteur de sécurité obtenir. + + + Obtient ou définit une valeur booléenne qui spécifie si le groupe associé à l'objet sécurisable a été modifié. + true si le groupe associé à l'objet sécurisable a été modifié ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si cet objet est un objet conteneur. + true si l'objet est un objet conteneur ; sinon, false. + + + Obtient une valeur booléenne qui spécifie si cet objet est un objet annuaire. + true si l'objet est un objet annuaire ; sinon, false. + + + Retourne une valeur booléenne qui spécifie si le descripteur de sécurité associé à cet objet peut être converti au format SDDL. + true si le descripteur de sécurité associé à cet objet peut être converti au format SDDL ; sinon false. + + + Applique la modification spécifiée à la liste de contrôle d'accès discrétionnaire associée à cet objet . + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès discrétionnaire. + Règle d'accès à modifier. + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + + + Applique la modification spécifiée à la liste de contrôle d'accès discrétionnaire associée à cet objet . + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès discrétionnaire. + Règle d'accès à modifier. + true si la modification de la liste de contrôle d'accès discrétionnaire réussit ; sinon false. + + + Applique la modification spécifiée à la liste de contrôle d'accès système associée à cet objet . + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès système. + Règle d'audit à modifier. + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + + + Applique la modification spécifiée à la liste de contrôle d'accès système associée à cet objet . + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + Modification à appliquer à la liste de contrôle d'accès système. + Règle d'audit à modifier. + true si la modification de la liste de contrôle d'accès système réussit ; sinon false. + + + Obtient ou définit une valeur booléenne qui spécifie si le propriétaire de l'objet sécurisable a été modifié. + true si le propriétaire de l'objet sécurisable a été modifié ; sinon, false. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + true pour activer le privilège qui permet à l'appelant de prendre possession de l'objet. + Nom utilisé pour récupérer les informations persistantes. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Handle utilisé pour récupérer les informations persistantes. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + + + Enregistre les sections spécifiées du descripteur de sécurité associées à cet objet dans un stockage permanent.Nous recommandons d'attribuer des valeurs identiques aux paramètres passés au constructeur et aux méthodes Persist.Pour plus d'informations, consultez la section Notes. + Nom utilisé pour récupérer les informations persistantes. + Une des valeurs d'énumération qui spécifie les sections du descripteur de sécurité (règles d'accès, règles d'audit, propriétaire, groupe principal) de l'objet sécurisable à enregistrer. + + + Supprime toutes les règles d'accès associées au spécifié. + + pour lequel supprimer toutes les règles d'accès. + Les règles d'accès ne suivent pas toutes un ordre canonique. + + + Supprime toutes les règles d'audit associées au spécifié. + + pour lequel supprimer toutes les règles d'audit. + Les règles d'audit ne suivent pas toutes un ordre canonique. + + + Verrouille cet objet pour un accès en lecture. + + + Déverrouille cet objet pour un accès en lecture. + + + Définit ou supprime la protection des règles d'accès associées à cet objet .Les règles d'accès protégées ne peuvent pas être modifiées par des objets parents via l'héritage. + true pour que les règles d'accès associées à cet objet n'aient pas d'héritage ; false pour autoriser l'héritage. + true pour conserver les règles d'accès héritées ; false pour supprimer des règles d'accès héritées.Ce paramètre est ignoré si est false. + Cette méthode essaie de supprimer des règles héritées d'une liste de contrôle d'accès discrétionnaire non canonique. + + + Définit ou supprime la protection des règles d'audit associées à cet objet .Les règles d'audit protégées ne peuvent pas être modifiées par des objets parents via l'héritage. + true pour que les règles d'audit associées à cet objet n'aient pas d'héritage ; false pour autoriser l'héritage. + true pour conserver les règles d'audit héritées ; false pour supprimer des règles d'audit héritées.Ce paramètre est ignoré si est false. + Cette méthode essaie de supprimer des règles héritées d'une liste de contrôle d'accès système non canonique. + + + Définit le groupe principal du descripteur de sécurité associé à cet objet . + Groupe principal à définir. + + + Définit le propriétaire du descripteur de sécurité associé à cet objet . + Propriétaire à définir. + + + Définit le descripteur de sécurité de cet objet à partir du tableau de valeurs, spécifiées en octets. + Tableau d'octets à partir duquel définir le descripteur de sécurité. + + + Définit les sections spécifiées du descripteur de sécurité de cet objet à partir du tableau de valeurs spécifiées en octets. + Tableau d'octets à partir duquel définir le descripteur de sécurité. + Sections (règles d'accès, règles d'audit, propriétaire, groupe principal) du descripteur de sécurité à définir. + + + Définit le descripteur de sécurité de cet objet à partir de la chaîne spécifiée en langage SDDL. + Chaîne SDDL à partir de laquelle définir le descripteur de sécurité. + + + Définit les sections spécifiées du descripteur de sécurité de cet objet à partir de la chaîne spécifiée en langage SDDL. + Chaîne SDDL à partir de laquelle définir le descripteur de sécurité. + Sections (règles d'accès, règles d'audit, propriétaire, groupe principal) du descripteur de sécurité à définir. + + + Verrouille cet objet pour un accès en écriture. + + + Déverrouille cet objet pour un accès en écriture. + + + Permet de contrôler l'accès aux objets sans manipulation directe des listes de contrôle d'accès (ACL). Permet aussi de disposer des droits d'accès de cast de type. + Droits d'accès pour l'objet. + + + Initialise une nouvelle instance de la classe ObjectSecurity`1. + true si le nouvel objet est un objet conteneur. + Type de ressource. + + + Initialise une nouvelle instance de la classe ObjectSecurity`1. + true si le nouvel objet est un objet conteneur. + Type de ressource. + Handle. + Sections à inclure. + + + Initialise une nouvelle instance de la classe ObjectSecurity`1. + true si le nouvel objet est un objet conteneur. + Type de ressource. + Handle. + Sections à inclure. + Délégué implémenté par des intégrateurs et fournissant des exceptions personnalisées. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Initialise une nouvelle instance de la classe ObjectSecurity`1. + true si le nouvel objet est un objet conteneur. + Type de ressource. + Nom de l'objet sécurisable auquel le nouvel objet est associé. + Sections à inclure. + + + Initialise une nouvelle instance de la classe ObjectSecurity`1. + true si le nouvel objet est un objet conteneur. + Type de ressource. + Nom de l'objet sécurisable auquel le nouvel objet est associé. + Sections à inclure. + Délégué implémenté par des intégrateurs et fournissant des exceptions personnalisées. + Objet qui contient des informations contextuelles sur la source ou la destination de l'exception. + + + Obtient le Type de l'objet sécurisable associé à cet objet ObjectSecurity`1. + Type de l'objet sécurisable associé à l'instance en cours. + + + Initialise une nouvelle instance de la classe ObjectAccessRule qui représente une nouvelle règle de contrôle d'accès pour l'objet de sécurité associé. + Représente une nouvelle règle de contrôle d'accès pour l'utilisateur spécifié, avec les droits d'accès, le contrôle d'accès et les indicateurs spécifiés. + Représente un compte d'utilisateur. + Type d'accès. + true si la règle d'accès est héritée ; sinon, false. + Spécifie comment propager les masques d'accès aux objets enfants. + Spécifie la manière de propager les entrées du contrôle d'accès vers les objets enfants. + Spécifie si l'accès est autorisé ou refusé. + + + Obtient le Type de l'objet associé aux règles d'accès de cet objet ObjectSecurity`1. + Type de l'objet associé aux règles d'accès de l'instance en cours. + + + Ajoute la règle d'accès spécifiée à la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1. + Règle à ajouter. + + + Ajoute la règle d'audit spécifiée à la liste de contrôle d'accès système associée à cet objet ObjectSecurity`1. + Règle d'audit à ajouter. + + + Initialise une nouvelle instance de la classe représentant la règle d'audit spécifiée pour l'utilisateur spécifié. + Retourne la règle d'audit spécifiée pour l'utilisateur spécifié. + Représente un compte d'utilisateur. + Entier qui spécifie un type d'accès. + true si la règle d'accès est héritée ; sinon, false. + Spécifie comment propager les masques d'accès aux objets enfants. + Spécifie la manière de propager les entrées du contrôle d'accès vers les objets enfants. + Décrit le type d'audit à exécuter. + + + Obtient l'objet Type associé aux règles d'audit de cet objet ObjectSecurity`1. + Objet Type associé aux règles d'audit de l'instance en cours. + + + Enregistre le descripteur de sécurité associé à cet objet ObjectSecurity`1 dans un stockage permanent, à l'aide du handle spécifié. + Handle de l'objet sécurisable auquel cet objet ObjectSecurity`1 est associé. + + + Enregistre le descripteur de sécurité associé à cet objet ObjectSecurity`1 dans un stockage permanent, à l'aide du nom spécifié. + Nom de l'objet sécurisable auquel cet objet ObjectSecurity`1 est associé. + + + Supprime les règles d'accès qui contiennent les mêmes identificateur de sécurité et masque d'accès que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1. + Retourne true si la suppression de la règle d'accès a réussi ; sinon, false. + Règle à supprimer. + + + Supprime toutes les règles d'accès qui ont le même identificateur de sécurité que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1. + Règle d'accès à supprimer. + + + Supprime toutes les règles d'accès qui correspondent exactement à la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1. + Règle d'accès à supprimer. + + + Supprime les règles d'audit qui contiennent les mêmes identificateur de sécurité et masque d'accès que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet ObjectSecurity`1. + Retourne true si l'objet a été supprimé ; sinon, false. + Règle d'audit à supprimer + + + Supprime toutes les règles d'audit qui ont le même identificateur de sécurité que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet ObjectSecurity`1. + Règle d'audit à supprimer. + + + Supprime toutes les règles d'audit qui correspondent exactement à la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet ObjectSecurity`1. + Règle d'audit à supprimer. + + + Supprime toutes les règles d'accès de la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1, puis ajoute la règle d'accès spécifiée. + Règle d'accès à réinitialiser. + + + Supprime toutes les règles d'accès qui contiennent les mêmes identificateur de sécurité et qualificateur que la règle d'accès spécifiée dans la liste de contrôle d'accès discrétionnaire associée à cet objet ObjectSecurity`1, puis ajoute la règle d'accès spécifiée. + Règle d'accès à définir. + + + Supprime toutes les règles d'audit qui contiennent les mêmes identificateur de sécurité et qualificateur que la règle d'audit spécifiée dans la liste de contrôle d'accès système associée à cet objet ObjectSecurity`1, puis ajoute la règle d'audit spécifiée. + Règle d'audit à définir. + + + Exception levée lorsqu'une méthode de l'espace de noms tente d'activer un privilège qu'elle n'a pas. + + + Initialise une nouvelle instance de la classe . + + + Initialise une nouvelle instance de la classe avec le privilège spécifié. + Privilège qui n'est pas activé. + + + Initialise une nouvelle instance de la classe à l'aide de l'exception spécifiée. + Privilège qui n'est pas activé. + Exception qui constitue la cause de l'exception actuelle.Si le paramètre n'est pas une référence null (Nothing en Visual Basic), l'exception en cours est levée dans un bloc catch qui gère l'exception interne. + + + Obtient le nom du privilège non activé. + Nom du privilège que la méthode n'a pas activé. + + + Spécifie la façon dont les entrées du contrôle d'accès sont propagées vers les objets enfants. Ces indicateurs ne sont significatifs que si des indicateurs d'héritage sont présents. + + + Spécifie que l'entrée du contrôle d'accès n'est propagée qu'aux objets enfants.Les objets enfants sont des objets conteneurs et descendants. + + + Spécifie qu'aucun indicateur d'héritage n'est défini. + + + Spécifie que l'entrée du contrôle d'accès n'est pas propagée aux objets enfants. + + + Représente une entrée du contrôle d'accès contenant un qualificateur.Le qualificateur, représenté par un objet , spécifie si l'entrée du contrôle d'accès accorde ou refuse l'accès et si elle provoque des audits ou des alertes de système.La classe est la classe de base abstraite des classes et . + + + Obtient une valeur qui spécifie si l'entrée du contrôle d'accès accorde ou refuse l'accès et si elle provoque des audits ou des alertes de système. + Valeur qui spécifie si l'entrée du contrôle d'accès accorde ou refuse l'accès et si elle provoque des audits ou des alertes de système. + + + Retourne les données de rappel opaques associées à cet objet . + Tableau des valeurs d'octet qui représente les données de rappel opaques associées à cet objet . + + + Spécifie si cet objet contient des données de rappel. + true si cet objet contient des données de rappel ; sinon, false. + + + Obtient la longueur des données de rappel opaques associées à cet objet .Cette propriété n'est valide que dans le cas d'entrées du contrôle d'accès. + Longueur des données de rappel opaques. + + + Définit les données de rappel opaques associées à cet objet . + Tableau de valeurs d'octet qui représente les données de rappel opaques de cet objet . + + + Représente une liste de contrôle d'accès. + + + Initialise une nouvelle instance de la classe avec le niveau de révision spécifié. + Niveau de révision de la nouvelle liste de contrôle d'accès. + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Initialise une nouvelle instance de la classe sous la forme binaire spécifiée. + Tableau de valeurs, exprimées en octets, représentant une liste de contrôle d'accès. + Offset dans le paramètre auquel commencer à démarshaler les données. + + + Obtient la longueur, en octets, de la représentation binaire de l'objet en cours.Cette longueur doit être utilisée avant de marshaler la liste de contrôle d'accès dans un tableau binaire avec la méthode . + Longueur, en octets, de la représentation binaire de l'objet en cours. + + + Obtient le nombre d'entrées du contrôle d'accès dans l'objet en cours. + Nombre d'entrées du contrôle d'accès dans l'objet en cours. + + + Marshale le contenu de l'objet dans le tableau d'octets spécifié en commençant à l'offset spécifié. + Tableau d'octets dans lequel le contenu de est marshalé. + Offset au niveau duquel commencer le marshaling. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Insère l'entrée du contrôle d'accès spécifiée à l'index spécifié. + Position à laquelle ajouter la nouvelle entrée du contrôle d'accès.Spécifiez la valeur de la propriété pour insérer une entrée du contrôle d'accès à la fin de l'objet . + entrée du contrôle d'accès à insérer. + + est négatif ou trop élevé pour que puisse être entièrement copié dans . + + + Obtient ou définit l'entrée du contrôle d'accès à l'index spécifié. + entrée du contrôle d'accès à l'index spécifié. + Index de base zéro de l'entrée du contrôle d'accès à obtenir ou définir. + + + Supprime l'entrée du contrôle d'accès à l'emplacement spécifié. + Index de base zéro de l'entrée du contrôle d'accès à supprimer. + La valeur du paramètre est plus élevée que la valeur de la propriété moins un ou elle est négative. + + + Obtient le numéro de révision de . + Valeur d'octet qui spécifie le niveau de révision de . + + + Représente un descripteur de sécurité.Un descripteur de sécurité inclut un propriétaire, un groupe principal, une liste de contrôle d'accès discrétionnaire et une liste de contrôle d'accès système. + + + Initialise une nouvelle instance de la classe à partir du tableau spécifié de valeurs d'octets. + Tableau de valeurs d'octets à partir duquel créer le nouvel objet . + Dans le tableau , offset auquel commencer la copie. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + Indicateurs qui spécifient le comportement du nouvel objet . + Propriétaire du nouvel objet . + Groupe principal du nouvel objet . + Liste de contrôle d'accès système du nouvel objet . + Liste de contrôle d'accès discrétionnaire du nouvel objet . + + + Initialise une nouvelle instance de la classe à partir de la chaîne SDDL spécifiée. + Chaîne SDDL à partir de laquelle créer le nouvel objet . + + + Obtient des valeurs qui spécifient le comportement de l'objet . + Une ou plusieurs valeurs de l'énumération associées par une opération OR logique. + + + Obtient ou définit la liste de contrôle d'accès discrétionnaire de cet objet .La liste de contrôle d'accès discrétionnaire contient des règles d'accès. + Liste de contrôle d'accès discrétionnaire de cet objet . + + + Obtient ou définit le groupe principal de cet objet . + Groupe principal de cet objet . + + + Obtient ou définit le propriétaire de l'objet associé à cet objet . + Propriétaire de l'objet associé à cet objet . + + + Obtient ou définit une valeur, en octets, qui représente les bits de contrôle de gestionnaire des ressources associés à cet objet . + Valeur en octets, qui représente les bits de contrôle du gestionnaire des ressources associés à cet objet . + + + Donne à la propriété de cet objet la valeur spécifiée. + Une ou plusieurs valeurs de l'énumération associées par une opération OR logique. + + + Obtient ou définit la liste de contrôle d'accès système de cet objet .La liste de contrôle d'accès système contient des règles d'audit. + Liste de contrôle d'accès système de cet objet . + + + Spécifie les types d'objet natifs définis. + + + Objet service d'annuaire, jeu de propriétés ou propriété d'un objet service d'annuaire. + + + Objet service d'annuaire et tous ses jeux de propriétés et propriétés. + + + Fichier ou répertoire. + + + Objet de noyau local. + + + Partage réseau. + + + Imprimante. + + + Objet défini par un fournisseur. + + + Clé de Registre. + + + Objet pour une entrée du Registre sous WOW64. + + + Service Windows. + + + Type d'objet inconnu. + + + Station Windows ou objet de bureau sur l'ordinateur local. + + + Objet WMI (Windows Management Instrumentation). + + + Spécifie la section d'un descripteur de sécurité à interroger ou définir. + + + Spécifie la liste de contrôle d'accès discrétionnaire. + + + Spécifie l'identificateur de groupe principal. + + + Spécifie l'identificateur du propriétaire. + + + Spécifie la liste de contrôle d'accès système. + + + Représente une liste de contrôle d'accès système. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Niveau de révision du nouvel objet . + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Nombre d'entrées du contrôle d'accès que cet objet peut contenir.Ce nombre n'est à utiliser qu'à titre indicatif. + + + Initialise une nouvelle instance de la classe avec les valeurs spécifiées à partir de l'objet spécifié. + true si le nouvel objet est un conteneur. + true si le nouvel objet est une liste de contrôle d'accès d'un objet annuaire. + Objet sous-jacent du nouvel objet .Spécifiez null pour créer une liste de contrôle d'accès vide. + + + Ajoute une règle d'audit à l'objet en cours. + Type de règle d'audit à ajouter. + + pour lequel ajouter une règle d'audit. + Masque d'accès de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle règle d'audit. + + + Ajoute une règle d'audit avec les paramètres spécifiés à l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité pour la nouvelle règle d'audit. + Type de règle d'audit à ajouter. + + pour lequel ajouter une règle d'audit. + Masque d'accès de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la nouvelle règle d'audit s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la nouvelle règle d'audit. + + + Ajoute une règle d'audit à l'objet en cours. + + pour lequel ajouter une règle d'audit. + Le pour la nouvelle règle d'audit. + + + Supprime la règle d'audit spécifiée de l'objet en cours. + true si cette méthode réussit à supprimer la règle d'audit spécifiée ; sinon, false. + Type de règle d'audit à supprimer. + + pour lequel supprimer une règle d'audit. + Masque d'accès de la règle à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle à supprimer. + + + Supprime la règle d'audit spécifiée de l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité. + true si cette méthode réussit à supprimer la règle d'audit spécifiée ; sinon, false. + Type de règle d'audit à supprimer. + + pour lequel supprimer une règle d'audit. + Masque d'accès de la règle à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle à supprimer. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la règle de contrôle d'audit supprimée s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la règle d'audit supprimée. + + + Supprime la règle d'audit spécifiée de l'objet en cours. + true si cette méthode réussit à supprimer la règle d'audit spécifiée ; sinon, false. + + pour lequel supprimer une règle d'audit. + + pour lequel supprimer une règle d'audit. + + + Supprime la règle d'audit spécifiée de l'objet en cours. + Type de règle d'audit à supprimer. + + pour lequel supprimer une règle d'audit. + Masque d'accès de la règle à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle à supprimer. + + + Supprime la règle d'audit spécifiée de l'objet en cours.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité. + Type de règle d'audit à supprimer. + + pour lequel supprimer une règle d'audit. + Masque d'accès de la règle à supprimer. + Indicateurs qui spécifient les propriétés d'héritage de la règle à supprimer. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la règle à supprimer. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la règle de contrôle d'audit supprimée s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la règle d'audit supprimée. + + + Supprime la règle d'audit spécifiée de l'objet en cours. + + pour lequel supprimer une règle d'audit. + Le pour la règle à supprimer. + + + Définit la règle d'audit spécifiée de l'objet spécifié. + Condition d'audit à définir. + + pour lequel définir une règle d'audit. + Masque d'accès de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle règle d'audit. + + + Définit la règle d'audit spécifiée de l'objet spécifié.Utilisez cette méthode pour les listes de contrôle d'accès des objets d'annuaire quand vous spécifiez le type d'objet ou le type d'objet hérité. + Condition d'audit à définir. + + pour lequel définir une règle d'audit. + Masque d'accès de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient les propriétés de propagation d'héritage de la nouvelle règle d'audit. + Indicateurs qui spécifient si les paramètres et contiennent des valeurs non null. + Identité de la classe des objets auxquels la nouvelle règle d'audit s'applique. + Identité de la classe des objets enfants qui peuvent hériter de la nouvelle règle d'audit. + + + Définit la règle d'audit spécifiée de l'objet spécifié. + + pour lequel définir une règle d'audit. + + pour lequel définir une règle d'audit. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/it/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/it/System.Security.AccessControl.xml new file mode 100644 index 0000000..a87faa8 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/it/System.Security.AccessControl.xml @@ -0,0 +1,1944 @@ + + + + System.Security.AccessControl + + + + Specifica le azioni consentite per gli oggetti che possono essere protetti. + + + Specifica l'accesso di sola scrittura. + + + Non specifica alcun accesso. + + + Specifica l'accesso di sola lettura. + + + Specifica il tipo di modifica del controllo di accesso da eseguire.Questa enumerazione viene utilizzata dai metodi della classe e dai relativi discendenti. + + + Aggiunge la regola di autorizzazione specificata all'elenco di controllo di accesso (ACL). + + + Rimuove le regole di autorizzazione che contengono lo stesso identificatore di sicurezza (SID) e la maschera di accesso come regola di autorizzazione specificata dall'ACL. + + + Rimuove le regole di autorizzazione che contengono lo stesso SID come regola di autorizzazione specificata dall'ACL. + + + Rimuove le regole di autorizzazione che corrispondono esattamente alla regola di autorizzazione specificata dall'ACL. + + + Rimuove le regole di autorizzazione che contengono lo stesso SID della regola di autorizzazione specificata dall'ACL e quindi aggiunge la regola di autorizzazione specificata all'ACL. + + + Rimuove tutte le regole di autorizzazione dall'ACL, quindi aggiunge la regola di autorizzazione specificata all'ACL. + + + Specifica le sezione di un descrittore di sicurezza da salvare o caricare. + + + Elenco di controllo di accesso discrezionale (DACL). + + + Intero descrittore di sicurezza. + + + Elenco di controllo di accesso di sistema (SACL). + + + Gruppo primario. + + + Nessuna sezione. + + + Proprietario. + + + Specifica se un oggetto viene utilizzato per consentire o negare l'accesso.Questi valori non sono flag e non possono essere combinati. + + + L'oggetto viene utilizzato per consentire l'accesso a un oggetto protetto. + + + L'oggetto viene utilizzato per negare l'accesso a un oggetto protetto. + + + Rappresenta una combinazione di identità di un utente, maschera di accesso e tipo di controllo di accesso (consenso o negazione).Un oggetto contiene inoltre informazioni su come la regola viene ereditata dagli oggetti figlio e come viene propagata l'ereditarietà. + + + Inizializza una nuova istanza della classe utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso.Questo parametro deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è un insieme di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true se la regola è ereditata da un contenitore padre. + Proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Tipo di controllo di accesso valido. + Non è possibile effettuare il cast del valore del parametro in oppure il parametro contiene un valore non valido. + Il valore del parametro è zero oppure i parametri o contengono valori di flag non riconosciuti. + + + Ottiene il valore associato all'oggetto . + Valore associato all'oggetto . + + + Rappresenta una combinazione di identità di un utente, maschera di accesso e tipo di controllo di accesso (consenso o negazione).Un oggetto AccessRule`1 contiene inoltre informazioni su come la regola viene ereditata dagli oggetti figlio e come viene propagata l'ereditarietà. + Tipo di diritti di accesso per la regola di accesso. + + + Inizializza una nuova istanza della classe AccessRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso. + Diritti della regola di accesso. + Tipo di controllo di accesso valido. + + + Inizializza una nuova istanza della classe AccessRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso. + Diritti della regola di accesso. + Proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Tipo di controllo di accesso valido. + + + Inizializza una nuova istanza della classe AccessRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso. + Diritti della regola di accesso. + Tipo di controllo di accesso valido. + + + Inizializza una nuova istanza della classe AccessRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso. + Diritti della regola di accesso. + Proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Tipo di controllo di accesso valido. + + + Ottiene i diritti dell'istanza corrente. + Diritti, cast come tipo <T>, dell'istanza corrente. + + + Consente di scorrere le voci di controllo di accesso (ACE, Access Control Entry) in un elenco di controllo di accesso (ACL; Access Control List). + + + Ottiene l'elemento corrente dell'insieme .Questa proprietà consente di ottenere la versione descrittiva del tipo dell'oggetto. + Elemento corrente nell'insieme . + + + Sposta l'enumeratore all'elemento successivo della raccolta . + true se l'enumeratore ha completato il passaggio all'elemento successivo; false se l'enumeratore ha raggiunto la fine della raccolta. + La raccolta è stata modificata dopo la creazione dell'enumeratore. + + + Imposta l'enumeratore sulla propria posizione iniziale, ovvero prima del primo elemento nell'insieme . + La raccolta è stata modificata dopo la creazione dell'enumeratore. + + + + Specifica il comportamento di una voce di controllo di accesso (ACE, Access Control Entry) in relazione all'ereditarietà e ai controlli. + + + Vengono controllati tutti i tentativi di accesso. + + + La maschera di accesso viene propagata agli oggetti contenitore figlio. + + + Vengono controllati i tentativi di accesso non riusciti. + + + Operatore OR logico di , , e . + + + Una voce ACE viene ereditata da un contenitore padre invece di essere impostata esplicitamente per un oggetto. + + + La maschera di accesso viene propagata solo agli oggetti figlio.Sono inclusi gli oggetti contenitore e gli oggetti figlio foglia. + + + Nessun flag ACE impostato. + + + I controlli di accesso non vengono applicati all'oggetto, ma solo ai corrispondenti oggetti figlio. + + + La maschera di accesso viene propagata negli oggetti figlio foglia. + + + Vengono controllati i tentativi di accesso riusciti. + + + Specifica la funzione di una voce di controllo di accesso (ACE, Access Control Entry). + + + Consente l'accesso. + + + Nega l'accesso. + + + Attiva un avviso di sistema. + + + Attiva un controllo di sistema. + + + Definisce i tipi di voci di controllo di accesso (ACE, Access Control Entry) disponibili. + + + Consente l'accesso a un oggetto per uno specifico trustee identificato da un oggetto . + + + Consente l'accesso a un oggetto per uno specifico trustee identificato da un oggetto .Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Consente l'accesso a un oggetto, a un insieme di proprietà o a una proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto e un oggetto che identifica il trustee a cui il sistema consentirà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio.Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Definito ma mai utilizzato.Incluso per motivi di completezza. + + + Consente l'accesso a un oggetto, a un insieme di proprietà o a una proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto e un oggetto che identifica il trustee a cui il sistema consentirà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio. + + + Nega l'accesso a un oggetto per uno specifico trustee identificato da un oggetto . + + + Nega l'accesso a un oggetto per uno specifico trustee identificato da un oggetto .Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Nega l'accesso a un oggetto, a un insieme di proprietà o a una proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto e un oggetto che identifica il trustee a cui il sistema consentirà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio.Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Nega l'accesso a un oggetto, a un insieme di proprietà o a una proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto e un oggetto che identifica il trustee a cui il sistema consentirà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio. + + + Rileva il tipo di voce ACE maggiormente definito nell'enumerazione. + + + Riservato per un utilizzo futuro. + + + Riservato per un utilizzo futuro. + + + Riservato per un utilizzo futuro. + + + Riservato per un utilizzo futuro. + + + Provoca la registrazione di un messaggio di controllo quando un trustee specificato tenta di ottenere l'accesso a un oggetto.Il trustee è identificato da un oggetto . + + + Provoca la registrazione di un messaggio di controllo quando un trustee specificato tenta di ottenere l'accesso a un oggetto.Il trustee è identificato da un oggetto .Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Provoca la registrazione di un messaggio di controllo quando un trustee specificato tenta di ottenere l'accesso a un oggetto o a oggetti secondari, quali insiemi di proprietà o proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto od oggetto secondario e un oggetto che identifica il trustee per il quale il sistema controllerà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio.Questo tipo di voce ACE può contenere dati di callback facoltativi.I dati di callback sono BLOB specifici del manager delle risorse che non sono interpretati. + + + Provoca la registrazione di un messaggio di controllo quando un trustee specificato tenta di ottenere l'accesso a un oggetto o a oggetti secondari, quali insiemi di proprietà o proprietà.La voce ACE contiene un insieme di diritti di accesso, un GUID che identifica il tipo di oggetto od oggetto secondario e un oggetto che identifica il trustee per il quale il sistema controllerà l'accesso.La voce ACE contiene anche un GUID e un insieme di flag che controllano l'ereditarietà della voce ACE da parte degli oggetti figlio. + + + Specifica le condizioni per il controllo dei tentativi di accesso a un oggetto che può essere protetto. + + + Vengono controllati i tentativi di accesso non riusciti. + + + Nessun tentativo di accesso viene controllato. + + + Vengono controllati i tentativi di accesso riusciti. + + + Rappresenta la combinazione dell'identità di un utente e di una maschera di accesso.Un oggetto contiene anche informazioni su come la regola viene ereditata dagli oggetti figlio, su come l'ereditarietà viene propagata e sulle condizioni per le quali viene eseguito il controllo. + + + Inizializza una nuova istanza della classe utilizzando i valori specificati. + Identità a cui viene applicata la regola di controllo.Deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è un insieme di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true per ereditare la regola da un contenitore padre. + Proprietà di ereditarietà della regola di controllo. + Indica se le regole di controllo sono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Condizioni per cui la regola viene controllata. + Non è possibile eseguire il cast del valore del parametro come oppure il parametro contiene un valore non valido. + Il valore del parametro è zero oppure i parametri o contengono valori di flag non riconosciuti. + + + Ottiene i flag di controllo per la regola di controllo. + Combinazione bit per bit dei valori dell'enumerazione.Questa combinazione specifica le condizioni di controllo per la regola di controllo. + + + Rappresenta una combinazione dell'identità di un utente e di una maschera di accesso. + + + + Inizializza una nuova istanza della classe AuditRule’1 utilizzando i valori specificati. + Identità a cui viene applicata questa regola di controllo. + Diritti della regola di controllo. + Condizioni per cui la regola viene controllata. + + + Inizializza una nuova istanza della classe AuditRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di controllo. + Diritti della regola di controllo. + Proprietà di ereditarietà della regola di controllo. + Indica se le regole di controllo sono propagate automaticamente. + Condizioni per cui la regola viene controllata. + + + Inizializza una nuova istanza della classe AuditRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di controllo. + Diritti della regola di controllo. + Proprietà della regola di controllo. + + + Inizializza una nuova istanza della classe AuditRule’1 utilizzando i valori specificati. + Identità a cui viene applicata la regola di controllo. + Diritti della regola di controllo. + Proprietà di ereditarietà della regola di controllo. + Indica se le regole di controllo sono propagate automaticamente. + Condizioni per cui la regola viene controllata. + + + Diritti della regola di controllo. + Restituisce . + + + Determina l'accesso agli oggetti da proteggere.Le classi derivate e offrono funzionalità speciali per l'accesso e il controllo. + + + Inizializza una nuova istanza della classe utilizzando i valori specificati. + Identità a cui viene applicata la regola di accesso. Questo parametro deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è un insieme di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true per ereditare la regola da un contenitore padre. + Proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Non è possibile sottoporre a cast il valore del parametro come classe . + Il valore del parametro è zero oppure i parametri o contengono valori di flag non riconosciuti. + + + Ottiene la maschera di accesso per questa regola. + Maschera di accesso per questa regola. + + + Ottiene la classe a cui viene applicata la regola. + Classe a cui viene applicata la regola. + + + Ottiene il valore dei flag che determinano come la regola viene ereditata dagli oggetti figlio. + Combinazione bit per bit dei valori dell'enumerazione. + + + Ottiene un valore che indica se la regola viene impostata in modo esplicito oppure se è ereditata da un oggetto contenitore padre. + true se la regola non è impostata in modo esplicito ma viene ereditata da un contenitore padre. + + + Ottiene il valore dei flag di propagazione, che determinano come l'ereditarietà di questa regola viene propagata agli oggetti figlio.Questa proprietà è importante solo quando il valore dell'enumerazione non è . + Combinazione bit per bit dei valori dell'enumerazione. + + + Rappresenta una raccolta di oggetti . + + + Inizializza una nuova istanza della classe . + + + Aggiunge un oggetto alla raccolta. + Oggetto da aggiungere alla raccolta. + + + Copia il contenuto della raccolta in una matrice. + Matrice in cui copiare il contenuto della raccolta. + Indice in base zero da cui ha inizio la copia. + + + + Ottiene l'oggetto in corrispondenza dell'indice specificato della raccolta. + Oggetto in corrispondenza dell'indice specificato. + Indice in base zero dell'oggetto da ottenere. + + + + + + + Rappresenta una voce di controllo di accesso (ACE, Access Control Entry). + + + Inizializza una nuova istanza della classe . + Flag che specificano le informazioni relative a ereditarietà, propagazione dell'ereditarietà e condizioni di controllo per la nuova voce di controllo di accesso (ACE). + Utilizzo della nuova voce ACE. + Maschera di accesso della voce ACE. + Classe associata alla nuova voce ACE. + true per specificare che la nuova voce ACE è una voce ACE di tipo callback. + Dati opachi associati alla nuova voce ACE.I dati opachi sono consentiti solo per i tipi di voci ACE di callback.La lunghezza di questa matrice non deve essere superiore al valore restituito del metodo . + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Usare questa lunghezza con il metodo prima di effettuare il marshalling dell'elenco ACL in una matrice binaria. + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui viene effettuato il marshalling del contenuto dell'oggetto . + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo alto per consentire la copia dell'intero oggetto nella matrice . + + + Ottiene la lunghezza massima consentita di un BLOB di dati opachi per le voci di controllo di accesso (ACE) di callback. + Lunghezza consentita di un BLOB di dati opachi. + true per specificare che l'oggetto è una voce ACE di tipo callback. + + + Rappresenta un elenco di controllo di accesso (ACL, Access Control List) e costituisce la classe base per le classi e . + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Tale lunghezza deve essere usata prima di effettuare il marshalling dell'elenco di controllo di accesso (ACL) in una matrice binaria mediante il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Ottiene il numero di voci di controllo di accesso (ACE) presenti nell'oggetto corrente. + Numero di voci ACE presenti nell'oggetto corrente. + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshalling. + Offset in corrispondenza del quale viene avviato il marshalling. + + + Ottiene un valore booleano che specifica se le voci di controllo di accesso (ACE) nell'oggetto corrente sono in ordine canonico. + true se le voci ACE nell'oggetto corrente sono in ordine canonico; in caso contrario, false. + + + Specifica se l'oggetto è un contenitore. + true se l'oggetto corrente è un contenitore. + + + Specifica se l'oggetto corrente è un elenco di controllo di accesso (ACL) di un oggetto directory. + true se l'oggetto corrente è un elenco ACL di un oggetto directory. + + + Ottiene o imposta l'oggetto in corrispondenza dell'indice specificato. + + in corrispondenza dell'indice specificato. + Indice in base zero dell'oggetto da ottenere o impostare. + + + Rimuove tutte le voci di controllo di accesso (ACE) contenute dall'oggetto e associate all'oggetto specificato. + Oggetto da verificare. + + + Rimuove tutte le voci di controllo di accesso (ACE) ereditate dall'oggetto . + + + Ottiene il livello di revisione della classe . + Valore di byte che specifica il livello di revisione della classe . + + + Controlla l'accesso a oggetti senza modifica diretta degli elenchi di controllo di accesso (ACL, Access Control List).Questa classe è la classe base astratta per la classe . + + + Inizializza una nuova istanza della classe . + true se il nuovo oggetto è un oggetto contenitore. + + + Aggiunge la regola di accesso specificata all'elenco DACL (Discretionary Access Control List) associato all'oggetto . + Regola di accesso da aggiungere. + + + Aggiunge la regola di controllo specificata all'elenco SACL (System Access Control List) associato all'oggetto . + Regola di controllo da aggiungere. + + + Ottiene un insieme delle regole di accesso associate all'identificatore di sicurezza specificato. + Insieme di regole di accesso associate all'oggetto specificato. + true per includere le regole di accesso esplicitamente impostate per l'oggetto. + true per includere le regole di accesso ereditate. + Specifica se l'ID di sicurezza per cui recuperare le regole di accesso è di tipo T:System.Security.Principal.SecurityIdentifier o di tipo T:System.Security.Principal.NTAccount.Il valore di questo parametro deve essere un tipo convertibile nel tipo . + + + + + + Ottiene un insieme di regole di accesso associate all'identificatore di sicurezza specificato. + Insieme di regole di controllo associate all'oggetto specificato. + true per includere le regole di controllo esplicitamente impostate per l'oggetto. + true per includere le regole di controllo ereditate. + Identificatore di sicurezza per il quale recuperare le regole di controllo.Deve essere un oggetto di cui è possibile eseguire il cast in un oggetto . + + + + + + Applica la modifica specificata all'elenco di controllo di accesso discrezionale (DACL) associato all'oggetto . + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + Modifica da applicare all'elenco DACL. + Regola di accesso da modificare. + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + + + Applica la modifica specificata all'elenco SACL (System Access Control List) associato all'oggetto . + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + Modifica da applicare all'elenco SACL. + Regola di controllo da modificare. + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + + + Rimuove le regole di accesso contenenti lo stesso ID di sicurezza e la stessa maschera di accesso della regola di accesso specificata dall'elenco di controllo di accesso discrezionale (DACL) associato all'oggetto . + true se la rimozione della regola di accesso è riuscita; in caso contrario, false. + Regola di accesso da rimuovere. + + + Rimuove tutte le regole di accesso che dispongono dello stesso identificatore di sicurezza e della stessa regola di accesso specificata dall'elenco DACL (Discretionary Access Control List) associato all'oggetto . + Regola di accesso da rimuovere. + + + Rimuove tutte le regole di accesso che corrispondono esattamente alla regola di accesso specificata dall'elenco DACL (Discretionary Access Control List) associato all'oggetto . + Regola di accesso da rimuovere. + + + Rimuove le regole di controllo contenenti lo stesso identificatore di sicurezza e la stessa maschera di accesso della regola di controllo specificata dall'elenco SACL (System Access Control List) associato all'oggetto . + true se la rimozione della regola di controllo è riuscita; in caso contrario, false. + Regola di controllo da rimuovere. + + + Rimuove tutte le regole di controllo che dispongono dello stesso ID di sicurezza e della stessa regola di controllo specificata dall'elenco di controllo di accesso di sistema (SACL) associato all'oggetto . + Regola di controllo da rimuovere. + + + Rimuove tutte le regole di controllo che corrispondono esattamente alla regola di controllo specificata dall'elenco di controllo di accesso di sistema (SACL) associato all'oggetto . + Regola di controllo da rimuovere. + + + Rimuove tutte le regole di accesso nell'elenco di controllo di accesso discrezionale (DACL) associato all'oggetto , quindi aggiunge la regola di accesso specificata. + Regola di accesso da ripristinare. + + + Rimuove tutte le regole di accesso contenenti lo stesso identificatore e qualificatore di sicurezza della regola di accesso specificata nell'elenco DACL (Discretionary Access Control List) associato all'oggetto , quindi aggiunge la regola di accesso specificata. + Regola di accesso da impostare. + + + Rimuove tutte le regole di controllo contenenti lo stesso identificatore e qualificatore di sicurezza della regola di controllo specificata nell'elenco SACL (System Access Control List) associato all'oggetto , quindi aggiunge la regola di controllo specificata. + Regola di controllo da impostare. + + + Rappresenta un descrittore di sicurezza.Un descrittore di sicurezza include un proprietario, un gruppo primario, un elenco di controllo di accesso discrezionale (DACL, Discretionary Access Control List) e un elenco di controllo di accesso di sistema (SACL, System Access Control List). + + + Inizializza una nuova istanza della classe dalla matrice di valori di byte specificata. + true se il nuovo descrittore di sicurezza è associato a un oggetto contenitore. + true se il nuovo descrittore di sicurezza è associato a un oggetto directory. + Matrice di valori di byte da cui creare il nuovo oggetto . + Offset nella matrice in corrispondenza del quale verrà iniziata la copia. + + + Inizializza una nuova istanza della classe dalle informazioni specificate. + true se il nuovo descrittore di sicurezza è associato a un oggetto contenitore. + true se il nuovo descrittore di sicurezza è associato a un oggetto directory. + Flag che specificano il comportamento del nuovo oggetto . + Proprietario del nuovo oggetto . + Gruppo primario del nuovo oggetto . + Elenco SACL (System Access Control List) del nuovo oggetto . + Elenco DACL (Discretionary Access Control List) del nuovo oggetto . + + + Consente di inizializzare una nuova istanza della classe dall'oggetto specificato. + true se il nuovo descrittore di sicurezza è associato a un oggetto contenitore. + true se il nuovo descrittore di sicurezza è associato a un oggetto directory. + Oggetto da cui creare il nuovo oggetto . + + + Inizializza una nuova istanza della classe dalla stringa SDDL (Security Descriptor Definition Language) specificata. + true se il nuovo descrittore di sicurezza è associato a un oggetto contenitore. + true se il nuovo descrittore di sicurezza è associato a un oggetto directory. + Stringa SDDL da cui creare il nuovo oggetto . + + + Imposta la proprietà per questa istanza di e imposta il flag . + Livello di revisione del nuovo oggetto . + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Imposta la proprietà per questa istanza di e imposta il flag . + Livello di revisione del nuovo oggetto . + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Ottiene i valori che specificano il comportamento dell'oggetto . + Uno o più valori dell'enumerazione combinati con un'operazione OR logica. + + + Ottiene o imposta l'elenco di controllo di accesso discrezionale dell'oggetto .L'elenco DACL contiene le regole di accesso. + Elenco DACL dell'oggetto . + + + Ottiene o imposta il gruppo primario dell'oggetto . + Gruppo primario dell'oggetto . + + + Ottiene un valore booleano che specifica se l'oggetto associato a questo oggetto è un oggetto contenitore. + true se l'oggetto associato a questo oggetto è un oggetto contenitore; in caso contrario, false. + + + Ottiene un valore booleano che specifica se l'elenco di controllo di accesso discrezionale associato a questo oggetto è in ordine canonico. + true se l'elenco DACL associato a questo oggetto è in ordine canonico; in caso contrario, false. + + + Ottiene un valore booleano che specifica se l'oggetto associato a questo oggetto è un oggetto directory. + true se l'oggetto associato a questo oggetto è un oggetto directory; in caso contrario, false. + + + Ottiene un valore booleano che specifica se l'elenco di controllo di accesso di sistema associato a questo oggetto è in ordine canonico. + true se l'elenco SACL associato a questo oggetto è in ordine canonico; in caso contrario, false. + + + Ottiene o imposta il proprietario dell'oggetto associato all'oggetto . + Proprietario dell'oggetto associato all'oggetto . + + + Rimuove tutte le regole di accesso per l'identificatore di sicurezza specificato dall'elenco DACL (Discretionary Access Control List) associato all'oggetto . + Identificatore di sicurezza per il quale rimuovere le regole di accesso. + + + Rimuove tutte le regole di controllo per l'identificatore di sicurezza specificato dall'elenco SACL (System Access Control List) associato all'oggetto . + Identificatore di sicurezza per il quale rimuovere le regole di controllo. + + + Imposta la protezione dall'ereditarietà per l'elenco DACL (Discretionary Access Control List) associato all'oggetto .Gli elenchi DACL che sono protetti non ereditano regole di accesso dai contenitori padre. + true per proteggere l'elenco DACL dall'ereditarietà. + true per conservare le regole di accesso ereditate nell'elenco DACL; false per rimuovere le regole di accesso ereditate dall'elenco DACL. + + + Imposta la protezione dall'ereditarietà per l'elenco SACL (System Access Control List) associato all'oggetto .Gli elenchi SACL che sono protetti non ereditano regole di controllo dai contenitori padre. + true per proteggere l'elenco SACL dall'ereditarietà. + true per conservare le regole di controllo ereditate nell'elenco SACL; false per rimuovere le regole di controllo ereditate dall'elenco SACL. + + + Ottiene o imposta l'elenco SACL (System Access Control List) dell'oggetto .L'elenco SACL contiene le regole di controllo. + Elenco SACL dell'oggetto . + + + Rappresenta una ACE (Access Control Entry, voce di controllo di accesso) composta. + + + Inizializza una nuova istanza della classe . + Contiene flag che specificano informazioni sulle condizioni di ereditarietà, propagazione dell'ereditarietà e controllo per la nuova ACE. + Maschera di accesso della voce ACE. + Valore ottenuto dall'enumerazione . + Classe associata alla nuova voce ACE. + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Questa lunghezza deve essere utilizzata prima di eseguire il marshaling dell'ACL in una matrice binaria con il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Ottiene o imposta il tipo di questo oggetto . + Tipo di questo oggetto . + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata nella posizione di offset specificata. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshaling. + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo elevato per consentire la copia di tutto l'oggetto in . + + + Specifica il tipo di un oggetto . + + + L'oggetto è utilizzato per la rappresentazione. + + + Questi flag hanno effetto sul comportamento del descrittore di sicurezza. + + + Specifica che l'elenco DACL (Discretionary Access Control List, elenco di controllo di accesso discrezionale) è stato ereditato automaticamente dall'elemento padre.Impostato solo dai gestori delle risorse. + + + Ignorato. + + + Specifica che il DACL è stato ottenuto da un meccanismo di impostazione.Impostato solo dai gestori delle risorse. + + + Specifica che il DACL non è null.Impostato dai gestori delle risorse o dagli utenti. + + + Specifica che il gestore delle risorse impedisce l'ereditarietà automatica.Impostato dai gestori delle risorse o dagli utenti. + + + Ignorato. + + + Specifica che il gruppo è stato ottenuto da un meccanismo di impostazione.Impostato solo dai gestori delle risorse; non deve essere impostato dai chiamanti. + + + Nessun flag di controllo. + + + Specifica che il proprietario è stato ottenuto da un meccanismo di impostazione.Impostato solo dai gestori delle risorse; non deve essere impostato dai chiamanti. + + + Specifica che i contenuti del campo riservato sono validi. + + + Specifica che la rappresentazione binaria del descrittore di sicurezza è in formato relativo. Questo flag è sempre impostato. + + + Ignorato. + + + Specifica che l'elenco SACL (System Access Control List, elenco di controllo di accesso di sistema) è stato ereditato automaticamente dall'elemento padre.Impostato solo dai gestori delle risorse. + + + Ignorato. + + + Specifica che il SACL è stato ottenuto da un meccanismo di impostazione.Impostato solo dai gestori delle risorse. + + + Specifica che il SACL non è null.Impostato dai gestori delle risorse o dagli utenti. + + + Specifica che il gestore delle risorse impedisce l'ereditarietà automatica.Impostato dai gestori delle risorse o dagli utenti. + + + Rappresenta una ACE (Access Control Entry, voce di controllo di accesso) non definita da uno dei membri dell'enumerazione . + + + Inizializza una nuova istanza della classe . + Tipo della nuova ACE.Questo valore deve essere maggiore di . + Flag che specificano informazioni sulle condizioni di ereditarietà, propagazione dell'ereditarietà e controllo per la nuova ACE. + Matrice di valori di byte che contiene i dati per la nuova ACE.Il valore può essere null.La lunghezza di questa matrice non deve essere superiore al valore del campo e deve essere un multiplo di quattro. + Il valore del parametro non è maggiore di oppure la lunghezza della matrice è maggiore del valore del campo o non è un multiplo di quattro. + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Questa lunghezza deve essere utilizzata prima di eseguire il marshaling dell'ACL in una matrice binaria con il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata nella posizione di offset specificata. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshaling. + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo elevato per consentire la copia di tutto l'oggetto in . + + + Restituisce i dati opachi associati a questo oggetto . + Matrice di valori di byte che rappresenta i dati opachi associati a questo oggetto . + + + Restituisce la lunghezza massima consentita per un blob di dati opachi per l'oggetto . + + + Ottiene la lunghezza dei dati opachi associati a questo oggetto . + Lunghezza dei dati di callback opachi. + + + Imposta i dati di callback opachi associati a questo oggetto . + Matrice di valori di byte che rappresenta i dati di callback opachi per questo oggetto . + + + Rappresenta un elenco di controllo di accesso discrezionale (DACL, Discretionary Access Control List). + + + Inizializza una nuova istanza della classe con i valori specificati. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Livello di revisione del nuovo oggetto . + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Inizializza una nuova istanza della classe con i valori specificati. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Inizializza una nuova istanza della classe con i valori specificati dell'oggetto specificato. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Oggetto sottostante per il nuovo oggetto .Specificare null per creare un elenco ACL vuoto. + + + Aggiunge una voce di controllo di accesso (ACE) con le impostazioni specificate all'oggetto corrente. + Tipo di controllo di accesso (consenso o negazione) da aggiungere. + Classe per la quale aggiungere una voce ACE. + Regola di accesso della nuova voce ACE. + Flag che specificano le proprietà di ereditarietà della nuova voce ACE. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova voce ACE. + + + Aggiunge una voce di controllo di accesso (ACE) con le impostazioni specificate all'oggetto corrente.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto o il tipo di oggetto ereditato della nuova voce ACE. + Tipo di controllo di accesso (consenso o negazione) da aggiungere. + Classe per la quale aggiungere una voce ACE. + Regola di accesso della nuova voce ACE. + Flag che specificano le proprietà di ereditarietà della nuova voce ACE. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova voce ACE. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la nuova voce ACE. + Identità della classe di oggetti figlio che possono ereditare la nuova voce ACE. + + + Aggiunge una voce di controllo di accesso (ACE) con le impostazioni specificate all'oggetto corrente. + Tipo di controllo di accesso (consenso o negazione) da aggiungere. + Classe per la quale aggiungere una voce ACE. + Oggetto per il nuovo accesso. + + + Rimuove la regola di controllo di accesso specificata dall'oggetto corrente. + true se l'accesso specificato viene rimosso dal metodo; in caso contrario, false. + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Classe per la quale rimuovere una regola di controllo di accesso. + Maschera di accesso per la regola da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola da rimuovere. + + + Rimuove la regola di controllo di accesso specificata dall'oggetto corrente.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto o il tipo di oggetto ereditato. + true se l'accesso specificato viene rimosso dal metodo; in caso contrario, false. + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Classe per la quale rimuovere una regola di controllo di accesso. + Maschera di accesso per la regola di controllo di accesso da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola di controllo di accesso da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola di controllo di accesso da rimuovere. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la regola di controllo di accesso rimossa. + identità della classe di oggetti figlio che possono ereditare la regola di controllo di accesso rimossa. + + + Rimuove la regola di controllo di accesso specificata dall'oggetto corrente. + Restituisce . + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Classe per la quale rimuovere una regola di controllo di accesso. + Oggetto per il quale rimuovere l'accesso. + + + Rimuove la voce di controllo di accesso (ACE) specificata dall'oggetto corrente. + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Oggetto per il quale rimuovere una voce ACE. + Maschera di accesso per la voce ACE da rimuovere. + Flag che specificano le proprietà di ereditarietà della voce ACE da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la voce ACE da rimuovere. + + + Rimuove la voce di controllo di accesso (ACE) specificata dall'oggetto corrente.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto per la voce ACE da rimuovere. + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Oggetto per il quale rimuovere una voce ACE. + Maschera di accesso per la voce ACE da rimuovere. + Flag che specificano le proprietà di ereditarietà della voce ACE da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la voce ACE da rimuovere. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la voce ACE rimossa. + Identità della classe di oggetti figlio che possono ereditare la voce ACE rimossa. + + + Rimuove la voce di controllo di accesso (ACE) specificata dall'oggetto corrente. + Tipo di controllo di accesso (consenso o negazione) da rimuovere. + Oggetto per il quale rimuovere una voce ACE. + Oggetto per il quale rimuovere l'accesso. + + + Imposta il controllo di accesso specificato per l'oggetto specificato. + Tipo di controllo di accesso (consenso o negazione) da impostare. + Oggetto per il quale impostare una voce ACE. + Regola di accesso della nuova voce ACE. + Flag che specificano le proprietà di ereditarietà della nuova voce ACE. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova voce ACE. + + + Imposta il controllo di accesso specificato per l'oggetto specificato. + Tipo di controllo di accesso (consenso o negazione) da impostare. + Oggetto per il quale impostare una voce ACE. + Regola di accesso della nuova voce ACE. + Flag che specificano le proprietà di ereditarietà della nuova voce ACE. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova voce ACE. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la nuova voce ACE. + Identità della classe di oggetti figlio che possono ereditare la nuova voce ACE. + + + Imposta il controllo di accesso specificato per l'oggetto specificato. + Tipo di controllo di accesso (consenso o negazione) da impostare. + Oggetto per il quale impostare una voce ACE. + Oggetto per il quale impostare l'accesso. + + + Rappresenta una ACE (Access Control Entry, voce del controllo di accesso) ed è la classe di base per tutte le altre classi ACE. + + + Ottiene o imposta l'enumerazione associata a questo oggetto . + Enumerazione associata a questo oggetto . + + + Ottiene il tipo di questa ACE. + Tipo di questa ACE. + + + Ottiene le informazioni di controllo associate a questa ACE. + Informazioni di controllo associate a questa ACE. + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Questa lunghezza deve essere utilizzata prima di eseguire il marshaling dell'ACL in una matrice binaria con il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Crea una copia completa di questa ACE. + Oggetto creato da questo metodo. + + + Crea un oggetto dai dati binari specificati. + Oggetto creato da questo metodo. + Dati binari da cui creare il nuovo oggetto . + Offset da cui iniziare l'unmarshaling. + + + Determina se l'oggetto specificato equivale all'oggetto corrente. + true se l'oggetto specificato equivale all'oggetto corrente. In caso contrario, false. + Oggetto da confrontare con l'oggetto corrente. + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshaling. + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo alto per consentire la copia dell'intero oggetto in . + + + Viene utilizzato come funzione hash per la classe .Il metodo può essere utilizzato in algoritmi di hash e strutture di dati, ad esempio una tabella hash. + Codice hash per l'oggetto corrente. + + + Ottiene flag che specificano le proprietà di ereditarietà di questa ACE. + Flag che specificano le proprietà di ereditarietà di questa ACE. + + + Ottiene un valore Boolean che specifica se questa ACE viene ereditata oppure viene impostata in modo esplicito. + true se l'ACE è ereditata. In caso contrario, false. + + + Determina se gli oggetti specificati sono considerati uguali. + true se i due oggetti sono uguali; in caso contrario, false. + Primo oggetto da confrontare. + Secondo oggetto da confrontare. + + + Determina se gli oggetti specificati sono considerati disuguali. + true se i due oggetti sono disuguali. In caso contrario, false. + Primo oggetto da confrontare. + Secondo oggetto da confrontare. + + + Ottiene flag che specificano le proprietà di propagazione dell'ereditarietà di questa ACE. + Flag che specificano le proprietà di propagazione dell'ereditarietà di questa ACE. + + + Rappresenta un elenco di controllo di accesso (ACL) ed è la classe di base per le classi , , e . + + + Inizializza una nuova istanza della classe . + + + Livello di revisione della classe corrente.Questo valore viene restituito dalla proprietà per le ACL non associate a oggetti di Servizi di directory. + + + Livello di revisione della classe corrente.Questo valore viene restituito dalla proprietà per le ACL associate a oggetti di Servizi di directory. + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Tale lunghezza deve essere utilizzata prima di eseguire il marshaling dell'ACL in una matrice binaria con il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Copia ciascuna classe della classe nella matrice specificata. + Matrice che contiene copie degli oggetti inclusi nella classe corrente. + Indice in base zero di in cui ha inizio la copia. + + + Ottiene il numero di voci di controllo di accesso (ACE) presenti nell'oggetto corrente. + Numero di voci ACE presenti nell'oggetto corrente. + + + Esegue il marshalling dei contenuti dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshaling. + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo alto per consentire la copia dell'intero oggetto in . + + + Restituisce una nuova istanza della classe . + Classe restituita da questo metodo. + + + Questa proprietà è sempre impostata su false.È implementata solo perché è necessaria per l'implementazione dell'interfaccia . + Sempre false. + + + Ottiene o imposta in corrispondenza dell'indice specificato. + + in corrispondenza dell'indice specificato. + Indice a base zero della classe da ottenere o impostare. + + + Lunghezza binaria massima consentita di un oggetto . + + + Ottiene il livello di revisione della classe . + Valore di byte che specifica il livello di revisione della classe . + + + Questa proprietà restituisce sempre null.È implementata solo perché è necessaria per l'implementazione dell'interfaccia . + Restituisce sempre null. + + + Copia ciascuna classe della classe nella matrice specificata. + Matrice che contiene copie degli oggetti inclusi nella classe corrente. + Indice in base zero di in cui ha inizio la copia. + + + Restituisce una nuova istanza della classe sottoposta a cast come istanza dell'interfaccia . + Nuovo oggetto , sottoposto a cast come istanza dell'interfaccia . + + + Rappresenta un descrittore di sicurezza.Un descrittore di sicurezza include un proprietario, un gruppo primario, un elenco di controllo di accesso discrezionale (DACL, Discretionary Access Control List) e un elenco di controllo di accesso di sistema (SACL, System Access Control List). + + + Inizializza una nuova istanza della classe . + + + Ottiene la lunghezza in byte della rappresentazione binaria dell'oggetto corrente.Tale lunghezza deve essere utilizzata prima di effettuare il marshalling dell'elenco ACL in una matrice binaria con il metodo . + Lunghezza in byte della rappresentazione binaria dell'oggetto corrente. + + + Ottiene i valori che specificano il comportamento dell'oggetto . + Uno o più valori dell'enumerazione combinati con un'operazione OR logica. + + + Restituisce una matrice di valori di byte che rappresenta le informazioni contenute nell'oggetto . + Matrice di byte in cui viene effettuato il marshalling del contenuto dell'oggetto . + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo alto per consentire la copia dell'intero oggetto in . + + + Restituisce la rappresentazione in formato SDDL (Security Descriptor Definition Language) delle sezioni specificate del descrittore di sicurezza rappresentato dall'oggetto . + Rappresentazione in formato SDDL delle sezioni specificate del descrittore di sicurezza associato all'oggetto . + Specifica le sezioni (regole di accesso, regole di controllo, gruppo primario, proprietà) del descrittore di sicurezza da ottenere. + + + Ottiene o imposta il gruppo primario dell'oggetto . + Gruppo primario dell'oggetto . + + + Restituisce un valore Boolean che specifica se il descrittore di sicurezza associato all'oggetto può essere convertito nel formato SDDL (Security Descriptor Definition Language). + true se il descrittore di sicurezza associato all'oggetto può essere convertito nel formato SDDL (Security Descriptor Definition Language); in caso contrario, false. + + + Ottiene o imposta il proprietario dell'oggetto associato all'oggetto . + Proprietario dell'oggetto associato all'oggetto . + + + Ottiene il livello di revisione dell'oggetto . + Valore di byte che specifica il livello di revisione dell'oggetto . + + + I flag di ereditarietà specificano la semantica per le voci di controllo di accesso (ACE). + + + L'ACE viene ereditata dagli oggetti contenitore figlio. + + + L'ACE non viene ereditata dagli oggetti figlio. + + + L'ACE viene ereditata dagli oggetti foglia figlio. + + + Incapsula tutti i tipi di voci di controllo di accesso (ACE, Access Control Entry) definiti da Microsoft.Tutti gli oggetti contengono una maschera di accesso a 32 bit e un oggetto . + + + Ottiene o imposta la maschera di accesso dell'oggetto . + Maschera di accesso dell'oggetto . + + + Ottiene o imposta l'oggetto associato all'oggetto . + Oggetto associato a questo oggetto . + + + Consente di controllare l'accesso agli oggetti nativi senza modifica diretta degli elenchi di controllo di accesso (ACL, Access Control List).I tipi di oggetti nativi sono definiti dall'enumerazione . + + + Inizializza una nuova istanza della classe con i valori specificati. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + + + Inizializza una nuova istanza della classe con i valori specificati.Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + Handle dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da includere in questo oggetto . + + + Inizializza una nuova istanza della classe con i valori specificati.Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + Handle dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da includere in questo oggetto . + Delegato implementato da integratori che fornisce eccezioni personalizzate. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Inizializza una nuova istanza della classe utilizzando i valori specificati. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + Delegato implementato da integratori che fornisce eccezioni personalizzate. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Inizializza una nuova istanza della classe con i valori specificati.Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + Nome dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da includere in questo oggetto . + + + Inizializza una nuova istanza della classe con i valori specificati.Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di oggetto che può essere protetto al quale è associato il nuovo oggetto . + Nome dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da includere in questo oggetto . + Delegato implementato da integratori che fornisce eccezioni personalizzate. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Consente di salvare in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + Handle dell'oggetto che può essere protetto al quale è associato l'oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da salvare. + L'oggetto che può essere protetto e al quale è associato l'oggetto è una directory o un file che non è possibile trovare. + + + Consente di salvare in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + Handle dell'oggetto che può essere protetto al quale è associato l'oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da salvare. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + L'oggetto che può essere protetto e al quale è associato l'oggetto è una directory o un file che non è possibile trovare. + + + Consente di salvare in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + Nome dell'oggetto che può essere protetto al quale è associato l'oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da salvare. + L'oggetto che può essere protetto e al quale è associato l'oggetto è una directory o un file che non è possibile trovare. + + + Consente di salvare in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di utilizzare valori identici per i parametri passati al costruttore e per i metodi Persist.Per ulteriori informazioni, vedere la sezione Osservazioni. + Nome dell'oggetto che può essere protetto al quale è associato l'oggetto . + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto che può essere protetto da salvare. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + L'oggetto che può essere protetto e al quale è associato l'oggetto è una directory o un file che non è possibile trovare. + + + Fornisce un metodo per gli integratori per il mapping dei codici di errore numerici a specifiche eccezioni create dagli integratori stessi. + Classe creata da questo delegato. + Codice di errore numerico. + Nome dell'oggetto da proteggere a cui è associato l'oggetto . + Handle dell'oggetto da proteggere a cui è associato l'oggetto . + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Rappresenta una combinazione di identità di un utente, maschera di accesso e tipo di controllo di accesso (consenso o negazione).Un oggetto contiene anche informazioni sul tipo di oggetto a cui la regola viene applicata, sul tipo di oggetto figlio che può ereditare la regola, su come la regola viene ereditata dagli oggetti figlio e su come l'ereditarietà viene propagata. + + + Inizializza una nuova istanza della classe con i valori specificati. + Identità a cui viene applicata la regola di accesso. Deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è un insieme di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true se la regola è ereditata da un contenitore padre. + Specifica le proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Tipo di oggetto a cui viene applicata la regola. + Tipo di oggetto figlio che può ereditare la regola. + Specifica se la regola concede o nega l'accesso. + Non è possibile effettuare il cast del valore del parametro in oppure il parametro contiene un valore non valido. + Il valore del parametro è 0 oppure i parametri o contengono valori di flag non riconosciuti. + + + Ottiene il tipo dell'oggetto figlio che può ereditare l'oggetto . + Tipo dell'oggetto figlio che può ereditare l'oggetto . + + + Ottiene flag che specificano se le proprietà e dell'oggetto contengono valori validi. + + specifica che la proprietà contiene un valore valido. specifica che la proprietà contiene un valore valido.Tali valori possono essere combinati con un'operazione OR logica. + + + Ottiene il tipo di oggetto a cui viene applicata la classe . + Tipo di oggetto a cui viene applicata la classe . + + + Controlla l'accesso agli oggetti di Servizi di directory.Questa classe rappresenta una voce ACE (Access Control Entry, voce del controllo di accesso) associata a un oggetto di directory. + + + Avvia una nuova istanza della classe . + Condizioni per l'ereditarietà, la propagazione dell'ereditarietà e per il controllo relative alla nuova voce ACE. + Utilizzo della nuova voce ACE. + Maschera di accesso della voce ACE. + Classe associata alla nuova voce ACE. + Indica se i parametri e contengono GUID oggetto validi. + GUID che identifica il tipo di oggetto a cui la nuova ACE viene applicata. + GUID che identifica il tipo di oggetto che può ereditare la nuova ACE. + true se la nuova ACE è un'ACE di tipo callback. + Dati opachi associati alla nuova voce ACE.Questi dati sono consentiti solo per ACE di tipo callback.La lunghezza di questa matrice non deve essere superiore al valore restituito del metodo . + Il parametro qualificatore contiene un valore non valido oppure la lunghezza del valore del parametro opaco è maggiore del valore restituito del metodo . + + + Ottiene la lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente.Questa lunghezza deve essere utilizzata prima di eseguire il marshaling dell'ACL in una matrice binaria con il metodo . + Lunghezza, in byte, della rappresentazione binaria dell'oggetto corrente. + + + Esegue il marshaling dei contenuti dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui i contenuti dell'oggetto vengono sottoposti a marshaling. + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo elevato per consentire la copia di tutto l'oggetto in . + + + Ottiene o imposta il GUID del tipo di oggetto che può ereditare l'ACE rappresentata da questo oggetto . + GUID del tipo di oggetto che può ereditare l'ACE rappresentata da questo oggetto . + + + Restituisce la lunghezza massima consentita, in byte, di un BLOB di dati opachi per ACE di callback. + Lunghezza massima consentita, in byte, di un BLOB di dati opachi per ACE di callback. + True se l'oggetto è un'ACE di callback. + + + Ottiene o imposta flag che specificano se le proprietà e contengono valori che identificano tipi di oggetti validi. + Uno o più membri dell'enumerazione combinati con un'operazione OR logica. + + + Ottiene o imposta il GUID del tipo di oggetto associato a questo oggetto . + GUID del tipo di oggetto associato a questo oggetto . + + + Indica la presenza di tipi di oggetti per le voci di controllo di accesso (ACE, Access Control Entry). + + + Tipo di oggetto che può ereditare la voce ACE. + + + Nessun tipo di oggetto presente. + + + È presente il tipo di oggetto associato alla voce ACE. + + + Rappresenta una combinazione di identità di un utente, maschera di accesso e condizioni di controllo.Un oggetto contiene inoltre informazioni sul tipo di oggetto a cui viene applicata la regola, sul tipo di oggetto figlio che può ereditare la regola, su come la regola viene ereditata dagli oggetti figlio e su come viene propagata l'ereditarietà. + + + Inizializza una nuova istanza della classe . + Identità a cui viene applicata la regola di accesso. Deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è un insieme di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true se la regola è ereditata da un contenitore padre. + Specifica le proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Tipo di oggetto a cui viene applicata la regola. + Tipo di oggetto figlio che può ereditare la regola. + Condizioni di controllo. + Non è possibile effettuare il cast del valore del parametro in oppure il parametro contiene un valore non valido. + Il valore del parametro è 0 oppure i parametri o contengono valori di flag non riconosciuti. + + + Ottiene il tipo di oggetto figlio che può ereditare l'oggetto . + Tipo di oggetto figlio che può ereditare l'oggetto . + + + Le proprietà e dell'oggetto contengono valori validi. + + specifica che la proprietà contiene un valore valido. specifica che la proprietà contiene un valore valido.Tali valori possono essere combinati con un'operazione OR logica. + + + Ottiene il tipo di oggetto a cui viene applicata la classe . + Tipo di oggetto a cui viene applicata la classe . + + + Consente di controllare l'accesso agli oggetti senza modificare direttamente le ACL (Access Control List, elenco di controllo di accesso).Questa è la classe base astratta per le classi e . + + + Inizializza una nuova istanza della classe . + + + Inizializza una nuova istanza della classe . + true se il nuovo oggetto è un oggetto contenitore. + True se il nuovo oggetto è un oggetto directory. + + + Inizializza una nuova istanza della classe . + Oggetto della nuova istanza di . + + + Ottiene la classe dell'oggetto a protezione diretta associato all'oggetto . + Tipo dell'oggetto a protezione diretta associato all'oggetto . + + + Inizializza una nuova istanza della classe con i valori specificati. + Oggetto creato da questo metodo. + Identità a cui viene applicata la regola di accesso.Deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è una raccolta di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true se la regola è ereditata da un contenitore padre. + Specifica le proprietà di ereditarietà della regola di accesso. + Specifica se le regole di accesso ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Specifica il tipo di controllo di accesso valido. + + + Ottiene o imposta un valore booleano che specifica se le regole di accesso associate a questo oggetto sono state modificate. + true se le regole di accesso associate a questo oggetto sono state modificate. In caso contrario, false. + + + Ottiene la classe dell'oggetto associato alle regole di accesso dell'oggetto .L'oggetto deve essere un oggetto di cui sia possibile eseguire il cast come oggetto . + Tipo dell'oggetto associato alle regole di accesso dell'oggetto . + + + Ottiene un valore booleano che specifica se le regole di accesso associate a questo oggetto sono in ordine canonico. + true se le regole di accesso sono in ordine canonico. In caso contrario, false. + + + Ottiene un valore booleano che specifica se l'elenco di controllo di accesso discrezionale (DACL, Discretionary Access Control List) associato all'oggetto è protetto. + true se il DACL è protetto. In caso contrario, false. + + + Ottiene un valore booleano che specifica se le regole di controllo associate all'oggetto sono in ordine canonico. + true se le regole di controllo sono in ordine canonico. In caso contrario, false. + + + Ottiene un valore booleano che specifica se l'elenco di controllo di accesso di sistema (SACL, System Access Control List) associato all'oggetto è protetto. + true se il SACL è protetto. In caso contrario, false. + + + Inizializza una nuova istanza della classe con i valori specificati. + Oggetto creato da questo metodo. + Identità a cui viene applicata la regola di controllo.Deve essere un oggetto di cui è possibile eseguire il cast in . + Maschera di accesso della regola.La maschera di accesso è una raccolta di bit anonimi a 32 bit, il cui significato è definito dai singoli integratori. + true se la regola è ereditata da un contenitore padre. + Specifica le proprietà di ereditarietà della regola di controllo. + Specifica se le regole di controllo ereditate vengono propagate automaticamente.I flag di propagazione vengono ignorati se è impostato su . + Specifica le condizioni in base alle quali viene controllata la regola. + + + Ottiene o imposta un valore booleano che specifica se le regole di controllo associate all'oggetto sono state modificate. + true se le regole di controllo associate all'oggetto sono state modificate. In caso contrario, false. + + + Ottiene l'oggetto associato alle regole di controllo dell'oggetto .L'oggetto deve essere un oggetto di cui sia possibile eseguire il cast come oggetto . + Tipo dell'oggetto associato alle regole di controllo dell'oggetto . + + + Ottiene il gruppo primario associato al proprietario specificato. + Gruppo primario associato al proprietario specificato. + Proprietario per cui ottenere il gruppo primario. + + + + + + Ottiene il proprietario associato al gruppo primario specificato. + Proprietario associato al gruppo specificato. + Gruppo primario per cui ottenere il proprietario. + + + + + + Restituisce una matrice di valori di byte che rappresenta le informazioni sul descrittore di sicurezza per l'oggetto . + Matrice di valori di byte che rappresenta le informazioni sul descrittore di sicurezza per l'oggetto .Questo metodo restituisce null se nell'oggetto non sono presenti informazioni di sicurezza. + + + Restituisce la rappresentazione SDDL (Security Descriptor Definition Language) delle sezioni specificate del descrittore di sicurezza associato all'oggetto . + Rappresentazione SDDL delle sezioni specificate del descrittore di sicurezza associato all'oggetto . + Specifica le sezioni (regole di accesso, regole di controllo, gruppo primario, proprietà) del descrittore di sicurezza da ottenere. + + + Ottiene o imposta un valore booleano che specifica se il gruppo associato all'oggetto a protezione diretta è stato modificato. + true se il gruppo associato all'oggetto da proteggere è stato modificato. In caso contrario, false. + + + Ottiene un valore booleano che specifica se l'oggetto è un oggetto contenitore. + true se l'oggetto è un oggetto contenitore. In caso contrario, false. + + + Ottiene un valore booleano che specifica se l'oggetto è un oggetto directory. + true se l'oggetto è un oggetto directory. In caso contrario, false. + + + Restituisce un valore booleano che specifica se il descrittore di sicurezza associato all'oggetto può essere convertito nel formato SDDL (Security Descriptor Definition Language). + true se il descrittore di sicurezza associato all'oggetto può essere convertito nel formato SDDL (Security Descriptor Definition Language); in caso contrario, false. + + + Applica la modifica specificata al DACL (Discretionary Access Control List, elenco di controllo di accesso discrezionale) associato all'oggetto . + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + Modifica da applicare all'elenco DACL. + Regola di accesso da modificare. + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + + + Applica la modifica specificata al DACL (Discretionary Access Control List, elenco di controllo di accesso discrezionale) associato all'oggetto . + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + Modifica da applicare all'elenco DACL. + Regola di accesso da modificare. + true se la modifica dell'elenco DACL è riuscita. In caso contrario, false. + + + Applica la modifica specificata al SACL (System Access Control List, elenco di controllo di accesso di sistema) associato all'oggetto . + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + Modifica da applicare all'elenco SACL. + Regola di controllo da modificare. + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + + + Applica la modifica specificata al SACL (System Access Control List, elenco di controllo di accesso di sistema) associato all'oggetto . + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + Modifica da applicare all'elenco SACL. + Regola di controllo da modificare. + true se la modifica dell'elenco SACL è riuscita; in caso contrario, false. + + + Ottiene o imposta un valore booleano che specifica se il proprietario dell'oggetto a protezione diretta è stato modificato. + true se il proprietario dell'oggetto da proteggere è stato modificato. In caso contrario, false. + + + Salva in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di usare valori identici per i parametri passati al costruttore e per i metodi Persist.Per altre informazioni, vedere la sezione Osservazioni. + true per abilitare il privilegio che consente al chiamante di acquisire la proprietà dell'oggetto. + Nome usato per recuperare le informazioni persistenti. + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto a protezione diretta da salvare. + + + Salva in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di usare valori identici per i parametri passati al costruttore e per i metodi Persist.Per altre informazioni, vedere la sezione Osservazioni. + Handle usato per recuperare le informazioni persistenti. + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto a protezione diretta da salvare. + + + Salva in un archivio permanente le sezioni specificate del descrittore di sicurezza associato all'oggetto .Si consiglia di usare valori identici per i parametri passati al costruttore e per i metodi Persist.Per altre informazioni, vedere la sezione Osservazioni. + Nome usato per recuperare le informazioni persistenti. + Uno dei valori dell'enumerazione che specifica le sezioni del descrittore di sicurezza (regole di accesso, regole di controllo, proprietario, gruppo primario) dell'oggetto a protezione diretta da salvare. + + + Rimuove tutte le regole di accesso associate all'oggetto specificat0. + Oggetto per cui rimuovere tutte le regole di accesso. + Le regole di accesso non sono in ordine canonico. + + + Rimuove tutte le regole di controllo associate all'oggetto specificato. + Oggetto per cui rimuovere tutte le regole di controllo. + Le regole di controllo non sono in ordine canonico. + + + Blocca l'oggetto per l'accesso in lettura. + + + Sblocca l'oggetto per l'accesso in lettura. + + + Imposta o rimuove la protezione per le regole di accesso associate all'oggetto .Le regole di accesso protette non possono essere modificate da oggetti padre mediante l'ereditarietà. + true per proteggere le regole di accesso associate all'oggetto mediante l'ereditarietà; false per consentire l'ereditarietà. + true per conservare le regole di accesso ereditate; false per rimuovere le regole di accesso ereditate.Questo parametro viene ignorato se è false. + Questo metodo tenta di rimuovere le regole ereditate da un DACL (Discretionary Access Control List, elenco di controllo di accesso discrezionale) non canonico. + + + Imposta o rimuove la protezione per le regole di controllo associate all'oggetto .Le regole di controllo protette non possono essere modificate da oggetti padre mediante l'ereditarietà. + true per proteggere le regole di controllo associate all'oggetto mediante l'ereditarietà; false per consentire l'ereditarietà. + true per conservare le regole di controllo ereditate; false per rimuovere le regole di controllo ereditate.Questo parametro viene ignorato se è false. + Questo metodo tenta di rimuovere le regole ereditate da un SACL (System Access Control List, elenco di controllo di accesso di sistema) non canonico. + + + Imposta il gruppo primario per il descrittore di sicurezza associato all'oggetto . + Gruppo primario da impostare. + + + Imposta il proprietario per il descrittore di sicurezza associato all'oggetto . + Proprietario da impostare. + + + Imposta il descrittore di sicurezza per l'oggetto dalla matrice specificata di valori di byte. + Matrice di byte da cui impostare il descrittore di sicurezza. + + + Imposta le sezioni specificate del descrittore di sicurezza per l'oggetto dalla matrice specificata di valori di byte. + Matrice di byte da cui impostare il descrittore di sicurezza. + Sezioni del descrittore di sicurezza da impostare (regole di accesso, regole di controllo, gruppo primario, proprietario). + + + Imposta il descrittore di sicurezza per l'oggetto dalla stringa SDDL (Security Descriptor Definition Language). + Stringa SDDL da cui impostare il descrittore di sicurezza. + + + Imposta le sezioni specificate del descrittore di sicurezza per l'oggetto dalla stringa SDDL (Security Descriptor Definition Language) specificata. + Stringa SDDL da cui impostare il descrittore di sicurezza. + Sezioni del descrittore di sicurezza da impostare (regole di accesso, regole di controllo, gruppo primario, proprietario). + + + Blocca l'oggetto per l'accesso in scrittura. + + + Sblocca l'oggetto per l'accesso in scrittura. + + + Consente di controllare l'accesso agli oggetti senza modifica diretta degli elenchi di controllo di accesso (ACL, Access Control List); garantisce inoltre i diritti di accesso tipo-cast. + Diritti di accesso per l'oggetto. + + + Inizializza una nuova istanza della classe ObjectSecurity`1. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di risorsa. + + + Inizializza una nuova istanza della classe ObjectSecurity`1. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di risorsa. + Handle. + Sezioni da includere. + + + Inizializza una nuova istanza della classe ObjectSecurity`1. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di risorsa. + Handle. + Sezioni da includere. + Delegato implementato da integratori che fornisce eccezioni personalizzate. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Inizializza una nuova istanza della classe ObjectSecurity`1. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di risorsa. + Nome dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Sezioni da includere. + + + Inizializza una nuova istanza della classe ObjectSecurity`1. + true se il nuovo oggetto è un oggetto contenitore. + Tipo di risorsa. + Nome dell'oggetto che può essere protetto al quale è associato il nuovo oggetto . + Sezioni da includere. + Delegato implementato da integratori che fornisce eccezioni personalizzate. + Oggetto contenente informazioni contestuali sull'origine o sulla destinazione dell'eccezione. + + + Ottiene il tipo dell'oggetto a protezione diretta associato all'oggetto ObjectSecurity`1. + Tipo dell'oggetto da proteggere associato all'istanza corrente. + + + Inizializza una nuova istanza della classe ObjectAccessRule che rappresenta una nuova regola di controllo di accesso per l'oggetto di sicurezza associato. + Rappresenta una nuova regola di controllo di accesso per l'utente specificato, con i diritti di accesso, il controllo di accesso e i flag specificati. + Rappresenta un account utente. + Tipo di accesso. + true se la regola di accesso è ereditata; in caso contrario false. + Specifica come propagare le maschere di accesso agli oggetti figlio. + Specifica il modo in cui le voci di controllo di accesso (ACE, Access Control Entry) vengono propagate agli oggetti figlio. + Specifica se l'accesso è consentito o negato. + + + Ottiene il tipo dell'oggetto associato alle regole di accesso dell'oggetto ObjectSecurity`1. + Tipo dell'oggetto associato alle regole di accesso dell'istanza corrente. + + + Aggiunge la regola di accesso specificata all'elenco DACL (Discretionary Access Control List) associato all'oggetto ObjectSecurity`1. + Le regole da aggiungere. + + + Aggiunge la regola di controllo specificata all'elenco SACL (System Access Control List) associato all'oggetto ObjectSecurity`1. + Regola di controllo da aggiungere. + + + Inizializza una nuova istanza della classe che rappresenta la regola di controllo specificata per l'utente specificato. + Restituisce la regola di controllo specificata per l'utente specificato. + Rappresenta un account utente. + Numero intero che specifica un tipo di accesso. + true se la regola di accesso è ereditata; in caso contrario false. + Specifica come propagare le maschere di accesso agli oggetti figlio. + Specifica il modo in cui le voci di controllo di accesso (ACE, Access Control Entry) vengono propagate agli oggetti figlio. + Descrive il tipo di controllo da eseguire. + + + Ottiene l'oggetto Type associato alle regole di controllo dell'oggetto ObjectSecurity`1. + Oggetto Type associato alle regole di controllo dell'istanza corrente. + + + Consente di salvare in un archivio permanente il descrittore di sicurezza associato all'oggetto ObjectSecurity`1 utilizzando l'handle specificato. + Handle dell'oggetto che può essere protetto al quale è associato l'oggetto ObjectSecurity`1. + + + Consente di salvare in un archivio permanente il descrittore di sicurezza associato all'oggetto ObjectSecurity`1 utilizzando il nome specificato. + Nome dell'oggetto che può essere protetto al quale è associato l'oggetto ObjectSecurity`1. + + + Rimuove le regole di accesso contenenti lo stesso ID di sicurezza e la stessa maschera di accesso della regola di accesso specificata dall'elenco di controllo di accesso discrezionale (DACL) associato all'oggetto ObjectSecurity`1. + Restituisce true se la rimozione della regola di accesso è riuscita; in caso contrario, false. + Il ruolo da rimuovere. + + + Rimuove tutte le regole di accesso che dispongono dello stesso identificatore di sicurezza e della stessa regola di accesso specificata dall'elenco DACL (Discretionary Access Control List) associato all'oggetto ObjectSecurity`1. + Regola di accesso da rimuovere. + + + Rimuove tutte le regole di accesso che corrispondono esattamente alla regola di accesso specificata dall'elenco DACL (Discretionary Access Control List) associato all'oggetto ObjectSecurity`1. + Regola di accesso da rimuovere. + + + Rimuove le regole di controllo contenenti lo stesso identificatore di sicurezza e la stessa maschera di accesso della regola di controllo specificata dall'elenco SACL (System Access Control List) associato all'oggetto ObjectSecurity`1. + Restituisce true se l'oggetto è stato rimosso; in caso contrario, false. + Regola di controllo da rimuovere + + + Rimuove tutte le regole di controllo che dispongono dello stesso ID di sicurezza e della stessa regola di controllo specificata dall'elenco di controllo di accesso di sistema (SACL) associato all'oggetto ObjectSecurity`1. + Regola di controllo da rimuovere. + + + Rimuove tutte le regole di controllo che corrispondono esattamente alla regola di controllo specificata dall'elenco di controllo di accesso di sistema (SACL) associato all'oggetto ObjectSecurity`1. + Regola di controllo da rimuovere. + + + Rimuove tutte le regole di accesso nell'elenco di controllo di accesso discrezionale (DACL) associato all'oggetto ObjectSecurity`1, quindi aggiunge la regola di accesso specificata. + Regola di accesso da ripristinare. + + + Rimuove tutte le regole di accesso contenenti lo stesso identificatore e qualificatore di sicurezza della regola di accesso specificata nell'elenco DACL (Discretionary Access Control List) associato all'oggetto ObjectSecurity`1, quindi aggiunge la regola di accesso specificata. + Regola di accesso da impostare. + + + Rimuove tutte le regole di controllo contenenti lo stesso identificatore e qualificatore di sicurezza della regola di controllo specificata nell'elenco SACL (System Access Control List) associato all'oggetto ObjectSecurity`1, quindi aggiunge la regola di controllo specificata. + Regola di controllo da impostare. + + + Eccezione generata quando un metodo nello spazio dei nomi tenta di abilitare un privilegio di cui non dispone. + + + Inizializza una nuova istanza della classe . + + + Inizializza una nuova istanza della classe con il privilegio specificato. + Privilegio che non è stato abilitato. + + + Inizializza una nuova istanza della classe con l'eccezione specificata. + Privilegio che non è stato abilitato. + Eccezione causa dell'eccezione corrente.Se il parametro non è un riferimento null, Nothing in Visual Basic, l'eccezione corrente viene generata in un blocco catch che gestisce l'eccezione interna. + + + Ottiene il nome del privilegio che non è stato abilitato. + Nome del privilegio che il metodo non è riuscito ad abilitare. + + + Specifica il modo in cui le voci di controllo di accesso (ACE, Access Control Entry) vengono propagate agli oggetti figlio. Questi flag sono significativi solo se sono presenti flag di ereditarietà. + + + Specifica che la voce ACE viene propagata solo agli oggetti figlio.Sono inclusi gli oggetti contenitore e gli oggetti figlio foglia. + + + Specifica che non è impostato alcun flag di ereditarietà. + + + Specifica che la voce ACE non viene propagata agli oggetti figlio. + + + Rappresenta una ACE (Access Control Entry, voce di controllo di accesso) che contiene un qualificatore.Il qualificatore, rappresentato da un oggetto , specifica se l'ACE concede l'accesso, nega l'accesso, determina controlli di sistema o provoca allarmi di sistema.La classe è la classe di base astratta per le classi e . + + + Ottiene un valore che specifica se l'ACE concede l'accesso, nega l'accesso, determina controlli di sistema o provoca allarmi di sistema. + Valore che specifica se l'ACE concede l'accesso, nega l'accesso, determina controlli di sistema o provoca allarmi di sistema. + + + Restituisce i dati di callback opachi associati a questo oggetto . + Matrice di valori di byte che rappresenta i dati di callback opachi associati a questo oggetto . + + + Specifica se questo oggetto contiene dati di callback. + true se l'oggetto contiene dati di callback. In caso contrario, false. + + + Ottiene la lunghezza dei dati di callback opachi associati a questo oggetto .Questa proprietà è valida solo per ACE di callback. + Lunghezza dei dati di callback opachi. + + + Imposta i dati di callback opachi associati a questo oggetto . + Matrice di valori di byte che rappresenta i dati di callback opachi per questo oggetto . + + + Rappresenta un elenco di controllo di accesso (ACL, Access Control List). + + + Inizializza una nuova istanza della classe con il livello di revisione specificato. + Livello di revisione del nuovo elenco ACL. + Numero di voci ACE che l'oggetto è in grado di contenere.Questo numero deve essere utilizzato solo come suggerimento. + + + Inizializza una nuova istanza della classe dal formato binario specificato. + Matrice di valori di byte che rappresentano un elenco ACL. + Offset nel parametro in corrispondenza del quale verrà effettuato l'unmarshalling dei dati. + + + Ottiene la lunghezza in byte della rappresentazione binaria dell'oggetto corrente.Tale lunghezza deve essere utilizzata prima di effettuare il marshalling dell'elenco ACL in una matrice binaria con il metodo . + Lunghezza in byte della rappresentazione binaria dell'oggetto corrente. + + + Ottiene il numero di voci di controllo di accesso (ACE) presenti nell'oggetto corrente. + Numero di voci ACE presenti nell'oggetto corrente. + + + Effettua il marshalling del contenuto dell'oggetto nella matrice di byte specificata, in corrispondenza dell'offset specificato. + Matrice di byte in cui viene effettuato il marshalling del contenuto dell'oggetto . + Offset in corrispondenza del quale viene avviato il marshalling. + + è negativo o troppo alto per consentire la copia dell'intero oggetto in . + + + Inserisce la voce ACE specificata in corrispondenza dell'indice specificato. + Posizione in cui verrà aggiunta la nuova voce ACE.Specificare il valore della proprietà per inserire una voce ACE alla fine dell'oggetto . + Voce ACE da inserire. + + è negativo o troppo alto per consentire la copia dell'intero oggetto in . + + + Ottiene o imposta la voce ACE (Access Control Entry) in corrispondenza dell'indice specificato. + Voce ACE in corrispondenza dell'indice specificato. + Indice in base zero della voce ACE da ottenere o impostare. + + + Rimuove la voce ACE in corrispondenza dell'indice specificato. + Indice in base zero della voce ACE da rimuovere. + Il valore del parametro è più elevato del valore della proprietà meno uno oppure è negativo. + + + Ottiene il livello di revisione dell'oggetto . + Valore di byte che specifica il livello di revisione dell'oggetto . + + + Rappresenta un descrittore di sicurezza.Un descrittore di sicurezza include un proprietario, un gruppo primario, un elenco di controllo di accesso discrezionale (DACL, Discretionary Access Control List) e un elenco di controllo di accesso di sistema (SACL, System Access Control List). + + + Inizializza una nuova istanza della classe dalla matrice di valori di byte specificata. + Matrice di valori di byte da cui creare il nuovo oggetto . + Offset nella matrice in corrispondenza del quale verrà iniziata la copia. + + + Inizializza una nuova istanza della classe con i valori specificati. + Flag che specificano il comportamento del nuovo oggetto . + Proprietario del nuovo oggetto . + Gruppo primario del nuovo oggetto . + Elenco SACL (System Access Control List) del nuovo oggetto . + Elenco di controllo di accesso discrezionale (DACL) del nuovo oggetto . + + + Inizializza una nuova istanza della classe dalla stringa SDDL (Security Descriptor Definition Language) specificata. + Stringa SDDL da cui creare il nuovo oggetto . + + + Ottiene i valori che specificano il comportamento dell'oggetto . + Uno o più valori dell'enumerazione combinati con un'operazione OR logica. + + + Ottiene o imposta l'elenco DACL (Discretionary Access Control List) dell'oggetto .L'elenco DACL contiene le regole di accesso. + Elenco DACL dell'oggetto . + + + Ottiene o imposta il gruppo primario dell'oggetto . + Gruppo primario dell'oggetto . + + + Ottiene o imposta il proprietario dell'oggetto associato all'oggetto . + Proprietario dell'oggetto associato all'oggetto . + + + Ottiene o imposta un valore di byte che rappresenta i bit di controllo del gestore delle risorse associati all'oggetto . + Valore di byte che rappresenta i bit di controllo del gestore delle risorse associati all'oggetto . + + + Imposta la proprietà dell'oggetto sul valore specificato. + Uno o più valori dell'enumerazione combinati con un'operazione OR logica. + + + Ottiene o imposta l'elenco SACL (System Access Control List) dell'oggetto .L'elenco SACL contiene le regole di controllo. + Elenco SACL dell'oggetto . + + + Specifica i tipi di oggetti nativi definiti. + + + Oggetto di Servizi di directory (DS) o set di proprietà o proprietà di un oggetto di Servizi di directory. + + + Oggetto di Servizi di directory e tutti i relativi gruppi di proprietà e tutte le proprietà. + + + File o directory. + + + Oggetto kernel locale. + + + Condivisione di rete. + + + Stampante. + + + Oggetto definito da un provider. + + + Chiave del Registro di sistema. + + + Oggetto relativo a una voce del Registro di sistema in WOW64. + + + Servizio Windows. + + + Tipo di oggetto sconosciuto. + + + Oggetto finestra o desktop sul computer locale. + + + Oggetto WMI (Windows Management Instrumentation). + + + Specifica la sezione di un descrittore di sicurezza su cui eseguire una query o da impostare. + + + Specifica l'elenco di controllo di accesso discrezionale (DACL). + + + Specifica l'identificatore di gruppo primario. + + + Specifica l'identificatore di proprietario. + + + Specifica l'elenco di controllo di accesso di sistema (SACL). + + + Rappresenta un SACL (System Access Control List, elenco di controllo di accesso di sistema). + + + Inizializza una nuova istanza della classe con i valori specificati. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Livello di revisione del nuovo oggetto . + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Inizializza una nuova istanza della classe con i valori specificati. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Numero di ACE (Access Control Entries, voci di controllo di accesso) che l'oggetto può contenere.Questo numero deve essere usato solo come suggerimento. + + + Inizializza una nuova istanza della classe con i valori specificati dell'oggetto specificato. + true se il nuovo oggetto è un contenitore. + true se il nuovo oggetto è un oggetto di directory ACL (Access Control List, elenco di controllo di accesso). + Oggetto sottostante per il nuovo oggetto .Specificare null per creare un elenco ACL vuoto. + + + Aggiunge una regola di controllo all'oggetto corrente. + Tipo di regola di controllo da aggiungere. + Oggetto per cui aggiungere una regola di controllo. + Maschera di accesso per la nuova regola di controllo. + Flag che specificano le proprietà di ereditarietà della nuova regola di controllo. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova regola di controllo. + + + Aggiunge una regola di controllo con le impostazioni specificate all'oggetto corrente.Usare questo metodo per l'oggetto di directory ACL quando si specifica il tipo di oggetto o il tipo di oggetto ereditato per la nuova regola di controllo. + Tipo di regola di controllo da aggiungere. + Oggetto per cui aggiungere una regola di controllo. + Maschera di accesso per la nuova regola di controllo. + Flag che specificano le proprietà di ereditarietà della nuova regola di controllo. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova regola di controllo. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la nuova regola di controllo. + Identità della classe di oggetti figlio che possono ereditare la nuova regola di controllo. + + + Aggiunge una regola di controllo all'oggetto corrente. + Oggetto per cui aggiungere una regola di controllo. + Oggetto per la nuova regola di controllo. + + + Rimuove la regola di controllo specificata dall'oggetto corrente. + true se il metodo rimuove la regola di controllo specificata. In caso contrario, false. + Tipo di regola di controllo da rimuovere. + Classe per cui rimuovere una regola di controllo. + Maschera di accesso per la regola da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola da rimuovere. + + + Rimuove la regola di controllo specificata dall'oggetto corrente.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto o il tipo di oggetto ereditato. + true se il metodo rimuove la regola di controllo specificata. In caso contrario, false. + Tipo di regola di controllo da rimuovere. + Classe per cui rimuovere una regola di controllo. + Maschera di accesso per la regola da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola da rimuovere. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui la regola di controllo rimossa viene applicata. + Identità della classe di oggetti figlio che può ereditare la regola di controllo rimossa. + + + Rimuove la regola di controllo specificata dall'oggetto corrente. + true se il metodo rimuove la regola di controllo specificata. In caso contrario, false. + Classe per cui rimuovere una regola di controllo. + Classe per cui rimuovere una regola di controllo. + + + Rimuove la regola di controllo specificata dall'oggetto corrente. + Tipo di regola di controllo da rimuovere. + Classe per cui rimuovere una regola di controllo. + Maschera di accesso per la regola da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola da rimuovere. + + + Rimuove la regola di controllo specificata dall'oggetto corrente.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto o il tipo di oggetto ereditato. + Tipo di regola di controllo da rimuovere. + Classe per cui rimuovere una regola di controllo. + Maschera di accesso per la regola da rimuovere. + Flag che specificano le proprietà di ereditarietà della regola da rimuovere. + Flag che specificano le proprietà di propagazione dell'ereditarietà per la regola da rimuovere. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui la regola di controllo rimossa viene applicata. + Identità della classe di oggetti figlio che può ereditare la regola di controllo rimossa. + + + Rimuove la regola di controllo specificata dall'oggetto corrente. + Classe per cui rimuovere una regola di controllo. + Oggetto per la regola da rimuovere. + + + Imposta la regola di controllo specificata per l'oggetto specificato. + Condizione di controllo da impostare. + Oggetto per cui impostare una regola di controllo. + Maschera di accesso per la nuova regola di controllo. + Flag che specificano le proprietà di ereditarietà della nuova regola di controllo. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova regola di controllo. + + + Imposta la regola di controllo specificata per l'oggetto specificato.Usare questo metodo per gli elenchi di controllo di accesso (ACL) di oggetti directory quando si specifica il tipo di oggetto o il tipo di oggetto ereditato. + Condizione di controllo da impostare. + Oggetto per cui impostare una regola di controllo. + Maschera di accesso per la nuova regola di controllo. + Flag che specificano le proprietà di ereditarietà della nuova regola di controllo. + Flag che specificano le proprietà di propagazione dell'ereditarietà della nuova regola di controllo. + Flag che specificano se i parametri e contengono valori non null. + Identità della classe di oggetti a cui viene applicata la nuova regola di controllo. + Identità della classe di oggetti figlio che possono ereditare la nuova regola di controllo. + + + Imposta la regola di controllo specificata per l'oggetto specificato. + Oggetto per cui impostare una regola di controllo. + Oggetto per cui impostare una regola di controllo. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ja/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ja/System.Security.AccessControl.xml new file mode 100644 index 0000000..022d8f6 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ja/System.Security.AccessControl.xml @@ -0,0 +1,2051 @@ + + + + System.Security.AccessControl + + + + セキュリティ設定できるオブジェクトに許可されたアクションを指定します。 + + + 書き込み専用アクセスを指定します。 + + + アクセス拒否を指定します。 + + + 読み取り専用アクセスを指定します。 + + + 実行するアクセス制御の変更の種類を指定します。この列挙体は クラスとその子孫クラスのメソッドで使用されます。 + + + 指定した承認規則をアクセス制御リスト (ACL: Access Control List) に追加します。 + + + 指定した承認規則と同じセキュリティ識別子 (SID) とアクセス マスクを含む承認規則を ACL から削除します。 + + + 指定した承認規則と同じ SID を含む承認規則を ACL から削除します。 + + + 指定した承認規則に完全に一致する承認規則を ACL から削除します。 + + + 指定した承認規則と同じ SID を含む承認規則を ACL から削除し、指定した承認規則を ACL に追加します。 + + + すべての承認規則を ACL から削除し、指定した承認規則を ACL に追加します。 + + + 保存するセキュリティ記述子のセクション、または読み込むセキュリティ記述子のセクションを指定します。 + + + 随意アクセス制御リスト (DACL: Discretionary Access Control List)。 + + + セキュリティ記述子全体。 + + + システム アクセス制御リスト (SACL: System Access Control List)。 + + + プライマリ グループ。 + + + セクションを指定しません。 + + + 所有者。 + + + アクセスの許可または拒否に オブジェクトを使用するかどうかを指定します。これらの値はフラグではありません。また、これらの値を組み合わせることはできません。 + + + + オブジェクトを使用して、セキュリティで保護されたオブジェクトへのアクセスを許可します。 + + + + オブジェクトを使用して、セキュリティで保護されたオブジェクトへのアクセスを拒否します。 + + + ユーザー ID、アクセス マスク、アクセス制御の種類 (許可または拒否) の組み合わせを表します。 オブジェクトには、子オブジェクトによる規則の継承方法や継承の反映方法に関する情報も格納されます。 + + + 指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。このパラメーターは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則が親コンテナーから継承される場合は true。 + アクセス規則の継承プロパティ。 + 継承したアクセス規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + 有効なアクセス制御の種類。 + + パラメーターの値を としてキャストできません。または、 パラメーターに無効な値が格納されています。 + + パラメーターの値がゼロ (0) です。または、 パラメーターまたは パラメーターに認識されないフラグ値が格納されています。 + + + この オブジェクトに関連付けられている 値を取得します。 + この オブジェクトに関連付けられている 値。 + + + ユーザー ID、アクセス マスク、アクセス制御の種類 (許可または拒否) の組み合わせを表します。AccessRule`1 オブジェクトには、子オブジェクトによる規則の継承方法や継承の反映方法に関する情報も格納されます。 + このアクセス規制のアクセス権の種類です。 + + + 指定した値を使用して、AccessRule’1 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。 + アクセス規則の権利。 + 有効なアクセス制御の種類。 + + + 指定した値を使用して、AccessRule’1 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。 + アクセス規則の権利。 + アクセス規則の継承プロパティ。 + 継承したアクセス規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + 有効なアクセス制御の種類。 + + + 指定した値を使用して、AccessRule’1 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。 + アクセス規則の権利。 + 有効なアクセス制御の種類。 + + + 指定した値を使用して、AccessRule’1 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。 + アクセス規則の権利。 + アクセス規則の継承プロパティ。 + 継承したアクセス規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + 有効なアクセス制御の種類。 + + + 現在のインスタンスの権限を取得します。 + 型 <T> にキャストした現在のインスタンスの権限です。 + + + アクセス制御リスト (ACL: Access Control List) 内のアクセス制御エントリ (ACE: Access Control Entry) を反復処理する機能を提供します。 + + + + コレクション内の現在の要素を取得します。このプロパティでは、型フレンドリなバージョンのオブジェクトを取得します。 + + コレクション内の現在の要素。 + + + 列挙子を コレクションの次の要素に進めます。 + 列挙子が次の要素に正常に進んだ場合は true。列挙子がコレクションの末尾を越えた場合は false。 + 列挙子が作成された後に、コレクションが変更されました。 + + + 列挙子を初期位置、つまり コレクションの最初の要素の前に設定します。 + 列挙子が作成された後に、コレクションが変更されました。 + + + + アクセス制御エントリ (ACE: Access Control Entry) の継承と監査に関する動作を指定します。 + + + すべてのアクセス試行が監査されます。 + + + アクセス マスクが子コンテナー オブジェクトに反映されます。 + + + 失敗したアクセス試行が監査されます。 + + + + 、および の論理 OR。 + + + ACE がオブジェクトに対して明示的に設定されるのではなく、親コンテナーから継承されます。 + + + アクセス マスクが子オブジェクトだけに反映されます。この操作には、子コンテナー オブジェクトと子リーフ オブジェクトの両方が含まれます。 + + + ACE フラグは設定されません。 + + + アクセス チェックがオブジェクトに適用されず、その子だけに適用されます。 + + + アクセス マスクが子リーフ オブジェクトに反映されます。 + + + 成功したアクセス試行が監査されます。 + + + アクセス制御エントリ (ACE: Access Control Entry) の機能を指定します。 + + + アクセスを許可します。 + + + アクセスを拒否します。 + + + システム警告を発生させます。 + + + システム監査を実行します。 + + + 使用可能なアクセス制御エントリ (ACE: Access Control Entry) の型を定義します。 + + + + オブジェクトで識別される特定のトラスティのオブジェクトへのアクセスを許可します。 + + + + オブジェクトで識別される特定のトラスティのオブジェクトへのアクセスを許可します。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + オブジェクト、プロパティ セット、またはプロパティへのアクセスを許可します。ACE には、アクセス権セット、オブジェクトの型を識別する GUID、およびシステムがアクセスを許可するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + 定義されていますが、使用されません。ここでは、すべての情報を紹介するために記載します。 + + + オブジェクト、プロパティ セット、またはプロパティへのアクセスを許可します。ACE には、アクセス権セット、オブジェクトの型を識別する GUID、およびシステムがアクセスを許可するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。 + + + + オブジェクトで識別される特定のトラスティのオブジェクトへのアクセスを拒否します。 + + + + オブジェクトで識別される特定のトラスティのオブジェクトへのアクセスを拒否します。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + オブジェクト、プロパティ セット、またはプロパティへのアクセスを拒否します。ACE には、アクセス権セット、オブジェクトの型を識別する GUID、およびシステムがアクセスを許可するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + オブジェクト、プロパティ セット、またはプロパティへのアクセスを拒否します。ACE には、アクセス権セット、オブジェクトの型を識別する GUID、およびシステムがアクセスを許可するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。 + + + 列挙体の中で最大の定義された ACE 型を追跡します。 + + + 将来使用するために予約されています。 + + + 将来使用するために予約されています。 + + + 将来使用するために予約されています。 + + + 将来使用するために予約されています。 + + + 指定したトラスティがオブジェクトへのアクセスを取得しようとした場合に、監査メッセージのログを記録します。トラスティは、 オブジェクトで識別されます。 + + + 指定したトラスティがオブジェクトへのアクセスを取得しようとした場合に、監査メッセージのログを記録します。トラスティは、 オブジェクトで識別されます。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + 指定したトラスティがオブジェクトまたはサブオブジェクト (プロパティ セットやプロパティなど) へのアクセスを取得しようとした場合に、監査メッセージのログを記録します。ACE には、アクセス権セット、オブジェクトまたはサブオブジェクトの型を識別する GUID、およびシステムがアクセスを監査するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。この ACE 型には、オプションのコールバック データを格納できます。コールバック データは、リソース マネージャー固有の解釈されない BLOB です。 + + + 指定したトラスティがオブジェクトまたはサブオブジェクト (プロパティ セットやプロパティなど) へのアクセスを取得しようとした場合に、監査メッセージのログを記録します。ACE には、アクセス権セット、オブジェクトまたはサブオブジェクトの型を識別する GUID、およびシステムがアクセスを監査するトラスティを識別する オブジェクトが格納されます。ACE には、GUID および、子オブジェクトによる ACE の継承を制御する一連のフラグも格納されます。 + + + セキュリティ設定できるオブジェクトへのアクセス試行を監査する条件を指定します。 + + + 失敗したアクセス試行を監査します。 + + + アクセス試行を監査しません。 + + + 成功したアクセス試行を監査します。 + + + ユーザーの ID とアクセス マスクの組み合わせを表します。 オブジェクトには、子オブジェクトが規則を継承する方法、継承の反映方法、監査が必要な条件などの情報も格納されます。 + + + 指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + 監査規則を適用する ID。このオブジェクトは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則を親コンテナーから継承する場合は true。 + 監査規則の継承プロパティ。 + 継承した監査規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + 規則を監査する条件。 + + パラメーターの値を としてキャストできません。または、 パラメーターに無効な値が格納されています。 + + パラメーターの値がゼロ (0) です。または、 パラメーターまたは パラメーターに認識されないフラグ値が格納されています。 + + + この監査規則の監査フラグを取得します。 + 列挙値のビットごとの組み合わせ。この組み合わせにより、この監査規則の監査条件を指定します。 + + + ユーザーの ID とアクセス マスクの組み合わせを表します。 + + + + 指定した値を使用して、AuditRule’1 クラスの新しいインスタンスを初期化します。 + この監査規則を適用する識別子。 + 監査規則の権利。 + 規則を監査する条件。 + + + 指定した値を使用して、AuditRule’1 クラスの新しいインスタンスを初期化します。 + 監査規則を適用する ID。 + 監査規則の権利。 + 監査規則の継承プロパティ。 + 継承した監査規則を自動的に反映させるかどうか。 + 規則を監査する条件。 + + + 指定した値を使用して、AuditRule’1 クラスの新しいインスタンスを初期化します。 + 監査規則を適用する ID。 + 監査規則の権利。 + 監査規則のプロパティ。 + + + 指定した値を使用して、AuditRule’1 クラスの新しいインスタンスを初期化します。 + 監査規則を適用する ID。 + 監査規則の権利。 + 監査規則の継承プロパティ。 + 継承した監査規則を自動的に反映させるかどうか。 + 規則を監査する条件。 + + + 監査規則の権利。 + + を返します。 + + + セキュリティ設定できるオブジェクトへのアクセスを決定します。 派生クラスおよび 派生クラスは、アクセスおよび監査に特化した機能を提供します。 + + + 指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。このパラメーターは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則を親コンテナーから継承する場合は true。 + アクセス規則の継承プロパティ。 + 継承したアクセス規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + + パラメーターの値を としてキャストできません。 + + パラメーターの値がゼロ (0) です。または、 パラメーターまたは パラメーターに認識されないフラグ値が格納されています。 + + + この規則のアクセス マスクを取得します。 + この規則のアクセス マスク。 + + + この規則を適用する を取得します。 + この規則を適用する + + + この規則を子オブジェクトが継承する方法を決定するフラグの値を取得します。 + 列挙値のビットごとの組み合わせ。 + + + この規則を明示的に設定するか、または親コンテナー オブジェクトから継承するかを指定する値を取得します。 + この規則を明示的に設定せず、親コンテナーから継承する場合は true。 + + + 反映フラグの値を取得します。このフラグから、この規則を子オブジェクトに反映させる方法を判断します。このプロパティが重要なのは、 列挙体の値が でない場合だけです。 + 列挙値のビットごとの組み合わせ。 + + + + オブジェクトのコレクションを表します。 + + + + クラスの新しいインスタンスを初期化します。 + + + + オブジェクトをコレクションに追加します。 + コレクションに追加する オブジェクト。 + + + コレクションの内容を配列にコピーします。 + コレクションの内容のコピー先の配列。 + コピーの開始位置となる、0 から始まるインデックス番号。 + + + + コレクションの指定したインデックス位置にある オブジェクトを取得します。 + 指定したインデックスの位置にある オブジェクト。 + 取得する オブジェクトの、0 から始まるインデックス。 + + + + + + + アクセス制御エントリ (ACE: Access Control Entry) を表します。 + + + + クラスの新しいインスタンスを初期化します。 + 新しいアクセス制御エントリ (ACE: Access Control Entry) の継承、継承の反映、および監査の各条件に関する情報を指定するフラグ。 + 新しい ACE の用途。 + ACE のアクセス マスク。 + 新しい ACE に関連付けられている 。 + 新しい ACE がコールバック型の ACE であることを指定する場合は true。 + 新しい ACE に関連付けられている非透過データ。非透過データは、コールバック ACE 型だけに使用できます。この配列の長さは メソッドの戻り値以下である必要があります。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。ACL をバイナリ配列にマーシャリングする前に、この長さを メソッドと共に使用します。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + + オブジェクトのコンテンツを、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + オブジェクトの内容のマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を 配列にコピーするには大きすぎます。 + + + コールバック アクセス制御エントリ (ACE) の非透過データ BLOB の許容最大長を取得します。 + 非透過データ BLOB に許容される長さ。 + + オブジェクトがコールバック ACE 型であることを指定する場合は true。 + + + アクセス制御リスト (ACL: Access Control List) を表します。このクラスは、 クラスおよび クラスの基本クラスです。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドを使用してアクセス制御リスト (ACL: Access Control List) をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + 現在の オブジェクト内のアクセス制御エントリ (ACE: Access Control Entry) の数を取得します。 + 現在の オブジェクト内の ACE の数。 + + + + オブジェクトのコンテンツを、指定したオフセットを開始位置として、指定したバイト配列にマーシャリングします。 + + のコンテンツのマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + + 現在の オブジェクト内のアクセス制御エントリ (ACE) の順序が正規順序であるかどうかを指定するブール値を取得します。 + 現在の オブジェクト内の ACE の順序が正規である場合は true。それ以外の場合は false。 + + + + オブジェクトがコンテナーであるかどうかを設定します。 + 現在の オブジェクトがコンテナーである場合は true。 + + + 現在の オブジェクトがディレクトリ オブジェクトのアクセス制御リスト (ACL: Access Control List) であるかどうかを設定します。 + 現在の オブジェクトがディレクトリ オブジェクトの ACL である場合は true。 + + + 指定したインデックス位置にある を取得または設定します。 + 指定されたインデックス位置にある + 取得または設定する の、0 から始まるインデックス番号。 + + + 指定した オブジェクトに関連付けられた、この オブジェクトに格納されているすべてのアクセス制御エントリ (ACE) を削除します。 + 確認する対象の オブジェクト。 + + + この オブジェクトからすべての継承されたアクセス制御エントリ (ACE) を削除します。 + + + + のリビジョン レベルを取得します。 + + のリビジョン レベルを示すバイト値。 + + + アクセス制御リスト (ACL: Access Control List) を直接操作せずにオブジェクトへのアクセスを制御します。このクラスは、 クラスの抽象基本クラスです。 + + + + クラスの新しいインスタンスを初期化します。 + 新しいオブジェクトがコンテナー オブジェクトである場合は true。 + + + 指定したアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) に追加します。 + 追加するアクセス規則。 + + + 指定した監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) に追加します。 + 追加する監査規則。 + + + 指定したセキュリティ識別子に関連付けられたアクセス規則のコレクションを取得します。 + 指定した オブジェクトに関連付けられたアクセス規則のコレクション。 + オブジェクトに対して明示的に設定されたアクセス規則を含める場合は true。 + 継承されたアクセス規則を含める場合は true。 + アクセス規則を取得する対象のセキュリティ識別子が、型 T:System.Security.Principal.SecurityIdentifier または型 T:System.Security.Principal.NTAccount かどうかを指定します。このパラメーターの値は、 型に変換できる型である必要があります。 + + + + + + 指定したセキュリティ識別子に関連付けられた監査規則のコレクションを取得します。 + 指定した オブジェクトに関連付けられた監査規則のコレクション。 + オブジェクトに対して明示的に設定された監査規則を含める場合は true。 + 継承された監査規則を含める場合は true。 + 監査規則を取得するセキュリティ識別子。このパラメーターは、 オブジェクトとしてキャストできるオブジェクトである必要があります。 + + + + + + 指定した変更を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) に適用します。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + DACL に適用する変更。 + 変更するアクセス規則。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + + + 指定した変更を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) に適用します。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + SACL に適用する変更。 + 変更する監査規則。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + + + 指定したアクセス規則と同じセキュリティ識別子とアクセス マスクを含むアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + アクセス規則が正常に削除された場合は true。それ以外の場合は false。 + 削除するアクセス規則。 + + + 指定したアクセス規則と同じセキュリティ識別子を含むすべてのアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + 削除するアクセス規則。 + + + 指定したアクセス規則と完全に一致するすべてのアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + 削除するアクセス規則。 + + + 指定した監査規則と同じセキュリティ識別子とアクセス マスクを含む監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 監査規則が正常に削除された場合は true。それ以外の場合は false。 + 削除する監査規則。 + + + 指定した監査規則と同じセキュリティ識別子を含むすべての監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 削除する監査規則。 + + + 指定した監査規則と完全に一致するすべての監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 削除する監査規則。 + + + この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) 内のすべてのアクセス規則を削除し、指定したアクセス規則を追加します。 + リセットするアクセス規則。 + + + 指定したアクセス規則と同じセキュリティ識別子と修飾子を含むすべてのアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control) から削除し、指定したアクセス規則を追加します。 + 設定するアクセス規則。 + + + 指定した監査規則と同じセキュリティ識別子と修飾子を含むすべての監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除し、指定した監査規則を追加します。 + 設定する監査規則。 + + + セキュリティ記述子を表します。セキュリティ記述子には、所有者、プライマリ グループ、随意アクセス制御リスト (DACL: Discretionary Access Control List)、システム アクセス制御リスト (SACL: System Access Control List) が含まれます。 + + + 指定したバイト値の配列から クラスの新しいインスタンスを初期化します。 + 新しいセキュリティ記述子がコンテナー オブジェクトに関連付けられている場合は true。 + 新しいセキュリティ記述子がディレクトリ オブジェクトに関連付けられている場合は true。 + 新しい オブジェクトの作成元となるバイト値の配列。 + コピーの開始位置を示す 配列内のオフセット。 + + + 指定した情報で クラスの新しいインスタンスを初期化します。 + 新しいセキュリティ記述子がコンテナー オブジェクトに関連付けられている場合は true。 + 新しいセキュリティ記述子がディレクトリ オブジェクトに関連付けられている場合は true。 + 新しい オブジェクトの動作を指定するフラグ。 + 新しい オブジェクトの所有者。 + 新しい オブジェクトのプライマリ グループ。 + 新しい オブジェクトの システム アクセス制御リスト (SACL: System Access Control List)。 + 新しい オブジェクトの随意アクセス制御リスト (DACL: Discretionary Access Control List)。 + + + 指定した オブジェクトから クラスの新しいインスタンスを初期化します。 + 新しいセキュリティ記述子がコンテナー オブジェクトに関連付けられている場合は true。 + 新しいセキュリティ記述子がディレクトリ オブジェクトに関連付けられている場合は true。 + 新しい オブジェクトの作成元の オブジェクト。 + + + 指定した SDDL (Security Descriptor Definition Language) 文字列から クラスの新しいインスタンスを初期化します。 + 新しいセキュリティ記述子がコンテナー オブジェクトに関連付けられている場合は true。 + 新しいセキュリティ記述子がディレクトリ オブジェクトに関連付けられている場合は true。 + 新しい オブジェクトの作成元の SDDL 文字列。 + + + 設定、プロパティをこのインスタンスとセット、フラグ。 + 新しい オブジェクトのリビジョン レベル。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 設定、プロパティをこのインスタンスとセット、フラグ。 + 新しい オブジェクトのリビジョン レベル。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + + オブジェクトの動作を指定する値を取得します。 + 論理 OR 操作と結合した 列挙体の 1 つ以上の値。 + + + この オブジェクトの随意アクセス制御リスト (DACL) を取得または設定します。DACL にはアクセス規則が格納されます。 + この オブジェクトの DACL。 + + + この オブジェクトのプライマリ グループを取得または設定します。 + この オブジェクトのプライマリ グループ。 + + + この オブジェクトに関連付けられたオブジェクトがコンテナー オブジェクトであるかどうかを指定するブール値を取得します。 + この オブジェクトに関連付けられたオブジェクトがコンテナー オブジェクトである場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) で使用する順序が標準の順序であるかどうかを示すブール値を取得します。 + この オブジェクトに関連付けられた DACL で使用する順序が標準の順序である場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられたオブジェクトがディレクトリ オブジェクトであるかどうかを指定するブール値を取得します。 + この オブジェクトに関連付けられたオブジェクトがディレクトリ オブジェクトである場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) で使用する順序が標準の順序であるかどうかを示すブール値を取得します。 + この オブジェクトに関連付けられた SACL で使用する順序が標準の順序である場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられているオブジェクトの所有者を取得または設定します。 + この オブジェクトに関連付けられているオブジェクトの所有者。 + + + 指定したセキュリティ識別子のすべてのアクセス規則を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL) から削除します。 + アクセス規則を削除するセキュリティ識別子。 + + + 指定したセキュリティ識別子のすべての監査規則を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 監査規則を削除するセキュリティ識別子。 + + + この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) の継承保護を設定します。保護された DACL は、親コンテナーからアクセス規則を継承しません。 + DACL を継承から保護する場合は true。 + 継承されたアクセス規則を DACL で維持する場合は true。継承されたアクセス規則を DACL から削除する場合は false。 + + + この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL) の継承保護を設定します。保護された SACL は、親コンテナーから監査規則を継承しません。 + SACL を継承から保護する場合は true。 + 継承された監査規則を SACL で維持する場合は true。継承された監査規則を SACL から削除する場合は false。 + + + この オブジェクトのシステム アクセス制御リスト (SACL: System Access Control List) を取得または設定します。SACL には監査規則が格納されます。 + この オブジェクトの SACL。 + + + 複合アクセス制御エントリ (ACE: Access Control Entry) を表します。 + + + + クラスの新しいインスタンスを初期化します。 + 新しいアクセス制御エントリ (ACE: Access Control Entry) の継承、継承の反映、および監査の各条件に関する情報を指定するフラグを格納します。 + ACE のアクセス マスク。 + + 列挙体の値。 + 新しい ACE に関連付けられている 。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + この オブジェクトの型を取得または設定します。 + この オブジェクトの型。 + + + + オブジェクトの内容を、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + のコンテンツのマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + + オブジェクトの型を指定します。 + + + + オブジェクトは、偽装に使用されます。 + + + これらのフラグは、セキュリティ記述子の動作に影響します。 + + + 随意アクセス制御リスト (DACL: Discretionary Access Control List) が親から自動的に継承されていることを指定します。設定できるのは、リソース マネージャーだけです。 + + + 無視されます。 + + + DACL が既定の機構によって取得されたことを指定します。設定できるのは、リソース マネージャーだけです。 + + + DACL が null でないことを指定します。設定できるのは、リソース マネージャーまたはユーザーだけです。 + + + リソース マネージャーが自動継承を防止することを指定します。設定できるのは、リソース マネージャーまたはユーザーだけです。 + + + 無視されます。 + + + グループ が既定の機構によって取得されたことを指定します。設定できるのは、リソース マネージャーだけです。呼び出し元で設定しないでください。 + + + 制御フラグがありません。 + + + 所有者 が既定の機構によって取得されたことを指定します。設定できるのは、リソース マネージャーだけです。呼び出し元で設定しないでください。 + + + 予約済みフィールドの内容が有効であることを指定します。 + + + セキュリティ記述子のバイナリ表現が自己相対形式であることを指定します。このフラグは、必ず設定されます。 + + + 無視されます。 + + + システム アクセス制御リスト (SACL: System Access Control List) が親から自動的に継承されていることを指定します。設定できるのは、リソース マネージャーだけです。 + + + 無視されます。 + + + SACL が既定の機構によって取得されたことを示します。設定できるのは、リソース マネージャーだけです。 + + + SACL が null でないことを指定します。設定できるのは、リソース マネージャーまたはユーザーだけです。 + + + リソース マネージャーが自動継承を防止することを指定します。設定できるのは、リソース マネージャーまたはユーザーだけです。 + + + + 列挙体のメンバーによって定義されていないアクセス制御エントリ (ACE: Access Control Entry) を表します。 + + + + クラスの新しいインスタンスを初期化します。 + 新しいアクセス制御エントリ (ACE: Access Control Entry) の型。この値は よりも大きくする必要があります。 + 新しい ACE の継承、継承の反映、および監査の各条件に関する情報を指定するフラグ。 + 新しい ACE のデータを格納するバイト値の配列。この値は、null の場合もあります。この配列の長さは、 フィールドの値以下であり、4 の倍数である必要があります。 + + パラメーターの値が 以下である、 配列の長さが フィールドの値を超えている、またはこの長さが 4 の倍数ではないのいずれかです。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + + オブジェクトの内容を、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + の内容のマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + この オブジェクトに関連付けられた非透過データを返します。 + この オブジェクトに関連付けられた非透過データを表すバイト値の配列。 + + + この オブジェクトの非透過データ BLOB の許容最大長を返します。 + + + この オブジェクトに関連付けられた非透過データの長さを取得します。 + 非透過コールバック データの長さ。 + + + この オブジェクトに関連付けられた非透過コールバック データを設定します。 + この オブジェクトの非透過コールバック データを表すバイト値の配列。 + + + 随意アクセス制御リスト (DACL: Discretionary Access Control List) を表します。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 新しい オブジェクトのリビジョン レベル。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 指定した オブジェクトからの指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object.空の ACL を作成するには、null を指定します。 + + + 指定した設定のアクセス制御エントリ (ACE) を現在の オブジェクトに追加します。 + 追加するアクセス制御の種類 (許可または拒否)。 + ACE を追加する 。 + 新しい ACE のアクセス規則。 + 新しい ACE の継承プロパティを示すフラグ。 + 新しい ACE の継承反映プロパティを示すフラグ。 + + + 指定した設定のアクセス制御エントリ (ACE) を現在の オブジェクトに追加します。このメソッドは、新しい ACE のオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL) に対して使用します。 + 追加するアクセス制御の種類 (許可または拒否)。 + ACE を追加する 。 + 新しい ACE のアクセス規則。 + 新しい ACE の継承プロパティを示すフラグ。 + 新しい ACE の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 新しい ACE を適用するオブジェクトのクラスの ID。 + 新しい ACE を継承できる子オブジェクトのクラスの ID。 + + + 指定した設定のアクセス制御エントリ (ACE) を現在の オブジェクトに追加します。 + 追加するアクセス制御の種類 (許可または拒否)。 + ACE を追加する 。 + + 新しいアクセスするためです。 + + + 指定したアクセス制御規則を現在の オブジェクトから削除します。 + 指定したアクセスがこのメソッドで正しく削除される場合は true。それ以外の場合は false。 + 削除するアクセス制御の種類 (許可または拒否)。 + アクセス制御規則を削除する 。 + 削除する規則のアクセス マスク。 + 削除する規則の継承プロパティを示すフラグ。 + 削除する規則の継承反映プロパティを示すフラグ。 + + + 指定したアクセス制御規則を現在の オブジェクトから削除します。このメソッドはオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL) に対して使用します。 + 指定したアクセスがこのメソッドで正しく削除される場合は true。それ以外の場合は false。 + 削除するアクセス制御の種類 (許可または拒否)。 + アクセス制御規則を削除する 。 + 削除するアクセス制御規則のアクセス マスク。 + 削除するアクセス制御規則の継承プロパティを示すフラグ。 + 削除するアクセス制御規則の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 削除されたアクセス制御規則を適用するオブジェクトのクラスの ID。 + 削除されたアクセス制御規則を継承できる子オブジェクトのクラスの ID。 + + + 指定したアクセス制御規則を現在の オブジェクトから削除します。 + + を返します。 + 削除するアクセス制御の種類 (許可または拒否)。 + アクセス制御規則を削除する 。 + + のアクセスを削除します。 + + + 指定したアクセス制御エントリ (ACE) を現在の オブジェクトから削除します。 + 削除するアクセス制御の種類 (許可または拒否)。 + ACE を削除する 。 + 削除する ACE のアクセス マスク。 + 削除する ACE の継承プロパティを示すフラグ。 + 削除する ACE の継承反映プロパティを示すフラグ。 + + + 指定したアクセス制御エントリ (ACE) を現在の オブジェクトから削除します。このメソッドは、削除する ACE のオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトの アクセス制御リスト (ACL) に対して使用します。 + 削除するアクセス制御の種類 (許可または拒否)。 + ACE を削除する 。 + 削除する ACE のアクセス マスク。 + 削除する ACE の継承プロパティを示すフラグ。 + 削除する ACE の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 削除された ACE を適用するオブジェクトのクラスの ID。 + 削除された ACE を継承できる子オブジェクトのクラスの ID。 + + + 指定したアクセス制御エントリ (ACE) を現在の オブジェクトから削除します。 + 削除するアクセス制御の種類 (許可または拒否)。 + ACE を削除する 。 + + のアクセスを削除します。 + + + 指定した オブジェクトについて、指定したアクセス制御を設定します。 + 設定するアクセス制御の種類 (許可または拒否)。 + ACE を設定する 。 + 新しい ACE のアクセス規則。 + 新しい ACE の継承プロパティを示すフラグ。 + 新しい ACE の継承反映プロパティを示すフラグ。 + + + 指定した オブジェクトについて、指定したアクセス制御を設定します。 + 設定するアクセス制御の種類 (許可または拒否)。 + ACE を設定する 。 + 新しい ACE のアクセス規則。 + 新しい ACE の継承プロパティを示すフラグ。 + 新しい ACE の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 新しい ACE を適用するオブジェクトのクラスの ID。 + 新しい ACE を継承できる子オブジェクトのクラスの ID。 + + + 指定した オブジェクトについて、指定したアクセス制御を設定します。 + 設定するアクセス制御の種類 (許可または拒否)。 + ACE を設定する 。 + + アクセスを設定します。 + + + アクセス制御エントリ (ACE: Access Control Entry) を表します。このクラスは、他のすべての ACE クラスの基本クラスです。 + + + この オブジェクトに関連付けられている を取得または設定します。 + + オブジェクトに関連付けられている + + + このアクセス制御エントリ (ACE: Access Control Entry) の型を取得します。 + この ACE の型。 + + + このアクセス制御エントリ (ACE: Access Control Entry) に関連付けられた監査情報を取得します。 + このアクセス制御エントリ (ACE: Access Control Entry) に関連付けられた監査情報。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + このアクセス制御エントリ (ACE: Access Control Entry) の詳細コピーを作成します。 + メソッドが作成する オブジェクト。 + + + 指定したバイナリ データから オブジェクトを作成します。 + このメソッドが作成する オブジェクト。 + 新しい オブジェクトの作成元のバイナリ データ。 + マーシャリング解除の開始位置を表すオフセット。 + + + 指定した オブジェクトが、現在の オブジェクトと等しいかどうかを判断します。 + 指定した オブジェクトが現在の オブジェクトと等しい場合は true。それ以外の場合は false。 + 現在の オブジェクトと比較する オブジェクト。 + + + + オブジェクトのコンテンツを、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + のコンテンツのマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + + クラスのハッシュ関数として機能します。 メソッドは、ハッシュ アルゴリズムや、ハッシュ テーブルなどのデータ構造での使用に適しています。 + 現在の オブジェクトのハッシュ コード。 + + + このアクセス制御エントリ (ACE: Access Control Entry) の継承プロパティを指定するフラグを取得します。 + この ACE の継承プロパティを指定するフラグ。 + + + このアクセス制御エントリ (ACE: Access Control Entry) が継承されるか、または明示的に設定されるかを示すブール値を取得します。 + この ACE が継承される場合は true。それ以外の場合は false。 + + + 指定した オブジェクトが等しいかどうかを判断します。 + 2 つの オブジェクトが等しい場合は true。それ以外の場合は false。 + 比較対象の第 1 オブジェクト。 + 比較対象の第 2 。 + + + 指定した オブジェクトが等しくないかどうかを判断します。 + 2 つの オブジェクトが等しくない場合は true。それ以外の場合は false。 + 比較対象の第 1 オブジェクト。 + 比較対象の第 2 。 + + + このアクセス制御エントリ (ACE: Access Control Entry) の継承反映プロパティを指定するフラグを取得します。 + この ACE の継承反映プロパティを指定するフラグ。 + + + アクセス制御リスト (ACL: Access Control List) を表します。また、、および の各クラスの基本クラスです。 + + + + クラスの新しいインスタンスを初期化します。 + + + 現在の のリビジョン レベル。この値は、ディレクトリ サービス オブジェクトに関連付けられていないアクセス制御リスト (ACL: Access Control List) の プロパティから返されます。 + + + 現在の のリビジョン レベル。この値は、ディレクトリ サービス オブジェクトに関連付けられているアクセス制御リスト (ACL: Access Control List) の プロパティから返されます。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ ( バイト単位)。 + + + 指定した配列に、現在の の各 をコピーします。 + 現在の が保持している オブジェクトのコピーを格納する配列。 + コピーの開始位置となる の、0 から始まるインデックス番号。 + + + 現在の オブジェクト内のアクセス制御エントリ (ACE: Access Control Entry) の数を取得します。 + 現在の オブジェクト内の ACE の数。 + + + + オブジェクトの内容を、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + のコンテンツのマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + + クラスの新しいインスタンスを返します。 + このメソッドが返す オブジェクト。 + + + このプロパティは必ず false に設定されます。このプロパティは、 インターフェイスを実装するためだけに実装されています。 + 常に false。 + + + 指定したインデックス位置にある を取得または設定します。 + 指定されたインデックスにある + 取得または設定する の、0 から始まるインデックス。 + + + + オブジェクトのバイナリの許容最大長。 + + + + のリビジョン レベルを取得します。 + + のリビジョン レベルを示すバイト値。 + + + このプロパティは常に null を返します。このプロパティは、 インターフェイスを実装するためだけに実装されています。 + 常に null を返します。 + + + 指定した配列に、現在の の各 をコピーします。 + 現在の が保持している オブジェクトのコピーを格納する配列。 + コピーの開始位置となる の、0 から始まるインデックス番号。 + + + + インターフェイスのインスタンスとしてキャストされる クラスの新しいインスタンスを返します。 + + インターフェイスのインスタンスとしてキャストされる新しい オブジェクト。 + + + セキュリティ記述子を表します。セキュリティ記述子には、所有者、プライマリ グループ、随意アクセス制御リスト (DACL: Discretionary Access Control List)、システム アクセス制御リスト (SACL: System Access Control List) が含まれます。 + + + + クラスの新しいインスタンスを初期化します。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + + オブジェクトの動作を指定する値を取得します。 + 論理 OR 操作と結合した 列挙体の 1 つ以上の値。 + + + この オブジェクトに格納された情報を表すバイト値の配列を返します。 + + の内容のマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + この オブジェクトが表すセキュリティ記述子の指定したセクションの SDDL (Security Descriptor Definition Language) 形式を返します。 + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションの SDDL 形式。 + 取得するセキュリティ記述子のセクション (アクセス規則、監査規則、プライマリ グループ、所有者) を指定します。 + + + この オブジェクトのプライマリ グループを取得または設定します。 + この オブジェクトのプライマリ グループ。 + + + この オブジェクトに関連付けられたセキュリティ記述子を SDDL (Security Descriptor Definition Language) 形式に変換できるかどうかを示すブール値を返します。 + この オブジェクトに関連付けられたセキュリティ記述子を SDDL (Security Descriptor Definition Language) 形式に変換できる場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられているオブジェクトの所有者を取得または設定します。 + この オブジェクトに関連付けられているオブジェクトの所有者。 + + + + オブジェクトのリビジョン レベルを取得します。 + + のリビジョン レベルを指定するバイト値。 + + + 継承フラグでは、アクセス制御エントリ (ACE: Access Control Entry) の継承のセマンティクスを指定します。 + + + ACE は、子コンテナー オブジェクトによって継承されます。 + + + ACE は、子オブジェクトによって継承されません。 + + + ACE は、子リーフ オブジェクトによって継承されます。 + + + 現在 Microsoft Corporation によって定義されているすべてのアクセス制御エントリ (ACE: Access Control Entry) をカプセル化します。すべての オブジェクトには、32 ビットのアクセス マスクと オブジェクトが格納されます。 + + + この オブジェクトのアクセス マスクを取得または設定します。 + この オブジェクトのアクセス マスク。 + + + この オブジェクトに関連付けられている オブジェクトを取得または設定します。 + この オブジェクトに関連付けられている オブジェクト。 + + + アクセス制御リスト (ACL: Access Control List) を直接操作せずにネイティブなオブジェクトへのアクセスを制御する機能を提供します。ネイティブなオブジェクト型は、 列挙体で定義されます。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトのハンドル。 + この オブジェクトに格納される、セキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトのハンドル。 + この オブジェクトに格納される、セキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + カスタムの例外を提供するインテグレーターによって実装されたデリゲート。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + 指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + カスタムの例外を提供するインテグレーターによって実装されたデリゲート。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + この オブジェクトに格納される、セキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの型。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + この オブジェクトに格納される、セキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + カスタムの例外を提供するインテグレーターによって実装されたデリゲート。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + この オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトのハンドル。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + この オブジェクトが関連付けられているセキュリティ設定できるオブジェクトがディレクトリまたはファイルであり、そのディレクトリまたはファイルが見つかりません。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + この オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトのハンドル。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + この オブジェクトが関連付けられているセキュリティ設定できるオブジェクトがディレクトリまたはファイルであり、そのディレクトリまたはファイルが見つかりません。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + この オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + この オブジェクトが関連付けられているセキュリティ設定できるオブジェクトがディレクトリまたはファイルであり、そのディレクトリまたはファイルが見つかりません。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + この オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + この オブジェクトが関連付けられているセキュリティ設定できるオブジェクトがディレクトリまたはファイルであり、そのディレクトリまたはファイルが見つかりません。 + + + インテグレーターが作成した特定の例外に数値エラー コードをマップする方法を提供します。 + このデリゲートで作成する + 数値エラー コード。 + + オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + + オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトのハンドル。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + ユーザー ID、アクセス マスク、アクセス制御の種類 (許可または拒否) の組み合わせを表します。 オブジェクトにも、規則を適用するオブジェクトの型、その規則を継承できる子オブジェクトの型、子オブジェクトによる規則の継承方法、および継承の反映方法に関する情報が格納されます。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。このオブジェクトは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則が親コンテナーから継承される場合は true。 + アクセス規則の継承プロパティを指定します。 + 継承したアクセス規則を自動的に反映させるかどうかを指定します。 に設定されている場合、反映フラグは無視されます。 + 規則を適用するオブジェクトの型。 + 規則を継承できる子オブジェクトの型。 + この規則でアクセスを許可するかどうかを指定します。 + + パラメーターの値を としてキャストできません。または、 パラメーターに無効な値が格納されています。 + + パラメーターの値がゼロ (0) です。または、 パラメーターまたは パラメーターに認識できないフラグ値が含まれています。 + + + + オブジェクトを継承できる子オブジェクトの型を取得します。 + + オブジェクトを継承できる子オブジェクトの型。 + + + + オブジェクトの プロパティおよび プロパティが有効な値を格納していることを指定するフラグを取得します。 + + は、 プロパティに有効な値が格納されていることを示します。 は、 プロパティに有効な値が格納されていることを示します。これらの値は論理 OR と組み合わせることができます。 + + + + を適用するオブジェクトの型を取得します。 + + を適用するオブジェクトの型。 + + + ディレクトリ サービス オブジェクトへのアクセスを制御します。このクラスは、ディレクトリ オブジェクトに関連付けられたアクセス制御エントリ (ACE: Access Control Entry) を表します。 + + + + クラスの新しいインスタンスを開始します。 + 新しいアクセス制御エントリ (ACE: Access Control Entry) の継承、継承の反映、および監査の各条件。 + 新しい ACE の用途。 + ACE のアクセス マスク。 + 新しい ACE に関連付けられている 。 + + パラメーターおよび パラメーターに有効なオブジェクト GUID が格納されているかどうか。 + 新しい ACE の適用対象となるオブジェクト型を識別する GUID。 + 新しい ACE を継承できるオブジェクト型を識別する GUID。 + 新しい ACE がコールバック型の ACE である場合は true。 + 新しい ACE に関連付けられている非透過データ。このパラメーターは、コールバック ACE 型だけに使用できます。この配列の長さは メソッドの戻り値以下である必要があります。 + 修飾子パラメーターに無効な値が格納されています。または、非透過パラメーターの値の長さが メソッドの戻り値を超えています。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで、ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + + オブジェクトのコンテンツを、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + のコンテンツのマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + この オブジェクトが表すアクセス制御エントリ (ACE: Access Control Entry) を継承できるオブジェクト型の GUID を取得または設定します。 + この オブジェクトが表すアクセス制御エントリ (ACE: Access Control Entry) を継承できるオブジェクト型の GUID。 + + + コールバック アクセス制御エントリ (ACE: Access Control Entry) の非透過データ BLOB の許容最大長をバイト単位で返します。 + コールバック アクセス制御エントリ (ACE: Access Control Entry) の非透過データ BLOB の許容最大長 (バイト単位)。 + + がコールバック ACE 型である場合は true。 + + + + プロパティおよび プロパティに、有効なオブジェクト型を示す値が格納されているかどうかを示すフラグを取得または設定します。 + 論理 OR 演算と結合した 列挙体の 1 つ以上のメンバー。 + + + この オブジェクトに関連付けられているオブジェクト型の GUID を取得または設定します。 + この オブジェクトに関連付けられているオブジェクト型の GUID。 + + + アクセス制御エントリ (ACE: Access Control Entry) のオブジェクトの型が存在するかどうかを示します。 + + + ACE を継承できるオブジェクトの型。 + + + オブジェクトの型は存在しません。 + + + ACE に関連付けられたオブジェクトの型が存在します。 + + + ユーザー ID、アクセス マスク、および監査条件の組み合わせを表します。 オブジェクトには、規則を適用するオブジェクトの型、その規則を継承できる子オブジェクトの型、子オブジェクトによる規則の継承方法、および継承の反映方法に関する情報も格納されます。 + + + + クラスの新しいインスタンスを初期化します。 + アクセス規則を適用する ID。このオブジェクトは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則が親コンテナーから継承される場合は true。 + アクセス規則の継承プロパティを指定します。 + 継承したアクセス規則を自動的に反映させるかどうか。 に設定されている場合、反映フラグは無視されます。 + 規則を適用するオブジェクトの型。 + 規則を継承できる子オブジェクトの型。 + 監査条件。 + + パラメーターの値を としてキャストできません。または、 パラメーターに無効な値が格納されています。 + + パラメーターの値がゼロ (0) です。または、 パラメーターまたは パラメーターに認識できないフラグ値が含まれています。 + + + + オブジェクトを継承できる子オブジェクトの型を取得します。 + + オブジェクトを継承できる子オブジェクトの型。 + + + + オブジェクトの プロパティおよび プロパティに有効な値が格納されます。 + + は、 プロパティに有効な値が格納されていることを示します。 は、 プロパティに有効な値が格納されていることを示します。これらの値は論理 OR と組み合わせることができます。 + + + + を適用するオブジェクトの型を取得します。 + + を適用するオブジェクトの型。 + + + アクセス制御リスト (ACL: Access Control List) を直接操作せずにオブジェクトへのアクセスを制御する機能を提供します。このクラスは、 クラスおよび クラスの抽象基本クラスです。 + + + + クラスの新しいインスタンスを初期化します。 + + + + クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + 新しい オブジェクトがディレクトリ オブジェクトである場合は true。 + + + + クラスの新しいインスタンスを初期化します。 + 新しい インスタンスの 。 + + + Gets the of the securable object associated with this object. + この オブジェクトに関連付けられている、セキュリティ設定できるオブジェクトの型。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + メソッドが作成する オブジェクト。 + アクセス規則を適用する ID。このオブジェクトは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則が親コンテナーから継承される場合は true。 + アクセス規則の継承プロパティを指定します。 + 継承したアクセス規則を自動的に反映させるかどうかを指定します。 に設定されている場合、反映フラグは無視されます。 + 有効なアクセス制御の種類を指定します。 + + + この オブジェクトに関連付けられたアクセス規則が変更されているかどうかを指定するブール値を取得または設定します。 + この オブジェクトに関連付けられたアクセス規則が変更されている場合は true。それ以外の場合は false。 + + + Gets the of the object associated with the access rules of this object. オブジェクトは、 オブジェクトとしてキャストできるオブジェクトである必要があります。 + この オブジェクトのアクセス規則に関連付けられたオブジェクトの型。 + + + この オブジェクトに関連付けられたアクセス規則の順序が標準であるかどうかを指定するブール値を取得します。 + アクセス規則の順序が標準である場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) が保護されているかどうかを指定するブール値を取得します。 + DACL が保護されている場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられた監査規則の順序が標準であるかどうかを指定するブール値を取得します。 + 監査規則の順序が標準のである場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) が保護されているかどうかを指定するブール値を取得します。 + SACL が保護されている場合は true。それ以外の場合は false。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + メソッドが作成する オブジェクト。 + 監査規則を適用する ID。このオブジェクトは、 としてキャストできるオブジェクトである必要があります。 + この規則のアクセス マスク。アクセス マスクは 32 ビットの匿名ビットのコレクションです。アクセス マスクの意味は、各インテグレーターによって定義されます。 + この規則が親コンテナーから継承される場合は true。 + 監査規則の継承プロパティを指定します。 + 継承した監査規則を自動的に反映させるかどうかを指定します。 に設定されている場合、反映フラグは無視されます。 + 規則を監査する条件を指定します。 + + + この オブジェクトに関連付けられた監査規則が変更されているかどうかを指定するブール値を取得または設定します。 + この オブジェクトに関連付けられた監査規則が変更されている場合は true。それ以外の場合は false。 + + + Gets the object associated with the audit rules of this object. オブジェクトは、 オブジェクトとしてキャストできるオブジェクトである必要があります。 + この オブジェクトの監査規則に関連付けられたオブジェクトの型。 + + + 指定した所有者に関連付けられているプライマリ グループを取得します。 + 指定した所有者に関連付けられているプライマリ グループ。 + プライマリ グループを取得する対象となる所有者。 + + + + + + 指定したプライマリ グループに関連付けられている所有者を取得します。 + 指定したグループに関連付けられている所有者。 + 所有者を取得する対象となるプライマリ グループ。 + + + + + + この オブジェクトのセキュリティ記述子情報を表すバイト値の配列を返します。 + この オブジェクトのセキュリティ記述子を表すバイト値の配列。この オブジェクトにセキュリティ情報が格納されていない場合、このメソッドは null を返します。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションの SDDL (Security Descriptor Definition Language) 形式を返します。 + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションの SDDL 形式。 + 取得するセキュリティ記述子のセクション (アクセス規則、監査規則、プライマリ グループ、所有者) を指定します。 + + + セキュリティ設定できるオブジェクトに関連付けられたグループが変更されているかどうかを指定するブール値を取得または設定します。 + セキュリティ設定できるオブジェクトに関連付けられたグループが変更されている場合は true。それ以外の場合は false。 + + + この オブジェクトがコンテナー オブジェクトであるかどうかを指定するブール値を取得します。 + + オブジェクトがコンテナー オブジェクトである場合は true。それ以外の場合は false。 + + + この オブジェクトがディレクトリ オブジェクトであるかどうかを指定するブール値を取得します。 + + オブジェクトがディレクトリ オブジェクトである場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられたセキュリティ記述子を SDDL (Security Descriptor Definition Language) 形式に変換できるかどうかを示すブール値を返します。 + この オブジェクトに関連付けられたセキュリティ記述子を SDDL (Security Descriptor Definition Language) 形式に変換できる場合は true。それ以外の場合は false。 + + + 指定した変更を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) に適用します。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + DACL に適用する変更。 + 変更するアクセス規則。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + + + 指定した変更を、この オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) に適用します。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + DACL に適用する変更。 + 変更するアクセス規則。 + DACL が正常に変更されている場合は true。それ以外の場合は false。 + + + 指定した変更を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) に適用します。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + SACL に適用する変更。 + 変更する監査規則。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + + + 指定した変更を、この オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) に適用します。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + SACL に適用する変更。 + 変更する監査規則。 + SACL が正常に変更されている場合は true。それ以外の場合は false。 + + + セキュリティ設定できるオブジェクトの所有者が変更されているかどうかを指定するブール値を取得または設定します。 + セキュリティ設定できるオブジェクトの所有者が変更されている場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 呼び出し元がオブジェクトの所有権を取得できる特権を有効にする場合は true。 + 永続化された情報を取得するための名前。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 永続化された情報を取得するためのハンドル。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + + + この オブジェクトに関連付けられたセキュリティ記述子の指定したセクションを、永続的なストレージに保存します。コンストラクターと Persist メソッドに渡す パラメーターの値を等しくすることをお勧めします。詳細については、「解説」を参照してください。 + 永続化された情報を取得するための名前。 + 保存するセキュリティ設定できるオブジェクトのセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ) を指定する 列挙値の 1 つ。 + + + 指定した に関連付けられたすべてのアクセス規則を削除します。 + すべてのアクセス規則を削除する対象の 。 + 一部のアクセス規則に標準の順序が適用されていません。 + + + 指定した に関連付けられたすべての監査規則を削除します。 + すべての監査規則を削除する対象の 。 + 一部のアクセス規則に標準の順序が適用されていません。 + + + 読み取りアクセスについて、この オブジェクトをロックします。 + + + 読み取りアクセスについて、この オブジェクトのロックを解除します。 + + + この オブジェクトに関連付けられたアクセス規則の保護を設定または削除します。保護されたアクセス規則を親オブジェクトから継承を通じて変更することはできません。 + この オブジェクトに関連付けられたアクセス規則を継承から保護する場合は true。継承を許可する場合は false。 + 継承されたアクセス規則を保存する場合は true。継承されたアクセス規則を削除する場合は false。 が false の場合、このパラメーターは無視されます。 + このメソッドは、継承された規則を標準以外の随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除しようとしています。 + + + この オブジェクトに関連付けられた監査規則の保護を設定または削除します。保護された監査規則を親オブジェクトから継承を通じて変更することはできません。 + この オブジェクトに関連付けられた監査規則を継承から保護する場合は true。継承を許可する場合は false。 + 継承された監査規則を保存する場合は true。継承された監査規則を削除する場合は false。 が false の場合、このパラメーターは無視されます。 + このメソッドは、継承された規則を標準以外のシステム アクセス制御リスト (SACL: System Access Control List ) から削除しようとしています。 + + + この オブジェクトに関連付けられたセキュリティ記述子のプライマリ グループを設定します。 + 設定するプライマリ グループ。 + + + この オブジェクトに関連付けられたセキュリティ記述子の所有者を設定します。 + 設定する所有者。 + + + 指定したバイト値の配列からこの オブジェクトのセキュリティ記述子を設定します。 + セキュリティ記述子の設定元となるバイト配列。 + + + 指定したバイト値の配列からこの オブジェクトのセキュリティ記述子の指定したセクションを設定します。 + セキュリティ記述子の設定元となるバイト配列。 + 設定するセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ)。 + + + 指定した SDDL (Security Descriptor Definition Language) 文字列からこの オブジェクトのセキュリティ記述子を設定します。 + セキュリティ記述子の設定元となる SDDL 文字列。 + + + 指定した SDDL (Security Descriptor Definition Language) 文字列からこの オブジェクトのセキュリティ記述子の指定したセクションを設定します。 + セキュリティ記述子の設定元となる SDDL 文字列。 + 設定するセキュリティ記述子のセクション (アクセス規則、監査規則、所有者、プライマリ グループ)。 + + + 書き込みアクセスについて、この オブジェクトをロックします。 + + + 書き込みアクセスについて、この オブジェクトのロックを解除します。 + + + アクセス制御リスト (ACL) が直接処理をしない、オブジェクトへのアクセスを制御する機能を提供し、型キャスト アクセス権を許可します。 + オブジェクトのアクセス権です。 + + + ObjectSecurity`1 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + リソースの種類。 + + + ObjectSecurity`1 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + リソースの種類。 + ハンドル。 + 含めるセクション。 + + + ObjectSecurity`1 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + リソースの種類。 + ハンドル。 + 含めるセクション。 + カスタムの例外を提供するインテグレーターによって実装されたデリゲート。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + ObjectSecurity`1 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + リソースの種類。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + 含めるセクション。 + + + ObjectSecurity`1 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナー オブジェクトである場合は true。 + リソースの種類。 + 新しい オブジェクトが関連付けられている、セキュリティ設定できるオブジェクトの名前。 + 含めるセクション。 + カスタムの例外を提供するインテグレーターによって実装されたデリゲート。 + 例外の発生元または発生先に関するコンテキスト情報を格納しているオブジェクト。 + + + この ObjectSecurity`1 オブジェクトに関連付けられたセキュリティ保護できるオブジェクトの型を取得します。 + 現在のインスタンスに関連付けられているセキュリティ保護可能なオブジェクトの型。 + + + 関連するセキュリティ オブジェクトの新しいアクセス制御規則を表す ObjectAccessRule クラスの新しいインスタンスを初期化します。 + アクセス権、アクセス制御、およびフラグを指定して、指定したユーザーに対して新しいアクセス制御規則を表します。 + ユーザー アカウントを表します。 + アクセスの種類。 + アクセス規則が継承されている場合は true。それ以外の場合は false。 + 子オブジェクトにアクセス マスクを反映する方法を指定します。 + アクセス制御エントリ (ACE) を子オブジェクトに伝達する方法を指定します。 + アクセスを許可または拒否するかどうかを指定します。 + + + この ObjectSecurity`1 オブジェクトのアクセス規則に関連付けられたオブジェクトの型を取得します。 + 現在のインスタンスのアクセス規則に関連付けられているオブジェクトの型。 + + + 指定したアクセス規則を、この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) に追加します。 + 追加する規則。 + + + 指定した監査規則を、この ObjectSecurity`1 オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) に追加します。 + 追加する監査規則。 + + + 指定したユーザーの指定した監査規則を表す クラスの新しいインスタンスを初期化します。 + 指定したユーザーの指定した監視規則を返します。 + ユーザー アカウントを表します。 + アクセスの種類を指定する整数。 + アクセス規則が継承されている場合は true。それ以外の場合は false。 + 子オブジェクトにアクセス マスクを反映する方法を指定します。 + アクセス制御エントリ (ACE) を子オブジェクトに伝達する方法を指定します。 + 実行する監査の種類を記述します。 + + + この ObjectSecurity`1 オブジェクトの監査規則に関連付けられた型オブジェクトを取得します。 + 現在のインスタンスの監査規則に関連付けられている Type オブジェクト。 + + + この ObjectSecurity`1 オブジェクトに関連付けられたセキュリティ記述子を、指定したハンドルを使用して永続的なストレージに保存します。 + この ObjectSecurity`1 オブジェクトが関連付けられている、セキュリティ保護可能なオブジェクトのハンドル。 + + + この ObjectSecurity`1 オブジェクトに関連付けられたセキュリティ記述子を、指定した名前を使用して永続的なストレージに保存します。 + この ObjectSecurity`1 オブジェクトが関連付けられている、セキュリティ保護可能なオブジェクトの名前。 + + + 指定したアクセス規則と同じセキュリティ識別子とアクセス マスクを含むアクセス規則を、この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + アクセス規則が正常に削除された場合は true を返します。それ以外の場合は false を返します。 + 削除する規則。 + + + 指定したアクセス規則と同じセキュリティ識別子を含むすべてのアクセス規則を、この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + 削除するアクセス規則。 + + + 指定したアクセス規則と完全に一致するすべてのアクセス規則を、この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) から削除します。 + 削除するアクセス規則。 + + + 指定した監査規則と同じセキュリティ識別子とアクセス マスクを含む監査規則を、この ObjectSecurity`1 オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + オブジェクトが削除された場合は true を返します。それ以外の場合は false を返します。 + 削除する監査規則。 + + + 指定した監査規則と同じセキュリティ識別子を含むすべての監査規則を、この ObjectSecurity`1 オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 削除する監査規則。 + + + 指定した監査規則と完全に一致するすべての監査規則を、この ObjectSecurity`1 オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除します。 + 削除する監査規則。 + + + この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control List) からすべてのアクセス規則を削除し、指定したアクセス規則を追加します。 + リセットするアクセス規則。 + + + 指定したアクセス規則と同じセキュリティ識別子と修飾子を含むすべてのアクセス規則を、この ObjectSecurity`1 オブジェクトに関連付けられた随意アクセス制御リスト (DACL: Discretionary Access Control) から削除し、指定したアクセス規則を追加します。 + 設定するアクセス規則。 + + + 指定した監査規則と同じセキュリティ識別子と修飾子を含むすべての監査規則を、この ObjectSecurity`1 オブジェクトに関連付けられたシステム アクセス制御リスト (SACL: System Access Control List) から削除し、指定した監査規則を追加します。 + 設定する監査規則。 + + + この例外は、 名前空間のメソッドが、特権がないのに、その特権を有効にしようとした場合にスローされます。 + + + + クラスの新しいインスタンスを初期化します。 + + + 特権を指定して、 クラスの新しいインスタンスを初期化します。 + 有効にされていない特権。 + + + 例外を指定して、 クラスの新しいインスタンスを初期化します。 + 有効にされていない特権。 + 現在の例外の原因である例外。 パラメーターが null 参照 (Visual Basic の場合は Nothing) でない場合は、内部例外を処理する catch ブロックで現在の例外が発生します。 + + + 有効にされていない特権の名前を取得します。 + メソッドで有効にできなかった特権の名前。 + + + アクセス制御エントリ (ACE: Access Control Entry) を子オブジェクトに反映させる方法を指定します。これらのフラグは継承フラグが存在する場合だけに意味を持ちます。 + + + ACE を子オブジェクトだけに反映させることを指定します。この操作には、子コンテナー オブジェクトと子リーフ オブジェクトの両方が含まれます。 + + + 継承フラグが設定されていないことを指定します。 + + + ACE を子オブジェクトに反映させないことを指定します。 + + + 修飾子を含むアクセス制御エントリ (ACE: Access Control Entry) を表します。 オブジェクトで表される修飾子は、ACE によるアクセス許可、アクセス拒否、システム監査の実行、またはシステム アラームの発生を指定します。 クラスは、 クラスおよび クラスの抽象基本クラスです。 + + + ACE によるアクセス許可、アクセス拒否、システム監査の実行、またはシステム アラームの発生を指定する値を取得します。 + ACE によるアクセス許可、アクセス拒否、システム監査の実行、またはシステム アラームの発生を指定する値。 + + + この オブジェクトに関連付けられた非透過コールバック データを返します。 + この オブジェクトに関連付けられた非透過コールバック データを表すバイト値の配列。 + + + この オブジェクトにコールバック データが格納されるかどうかを指定します。 + この オブジェクトにコールバック データが格納される場合は true。それ以外の場合は false。 + + + この オブジェクトに関連付けられた非透過コールバック データの長さを取得します。このプロパティはコールバックのアクセス制御エントリ (ACE: Access Control Entry) だけに有効です。 + 非透過コールバック データの長さ。 + + + この オブジェクトに関連付けられた非透過コールバック データを設定します。 + この オブジェクトの非透過コールバック データを表すバイト値の配列。 + + + アクセス制御リスト (ACL: Access Control List) を表します。 + + + リビジョン レベルを指定して、 クラスの新しいインスタンスを初期化します。 + 新しいアクセス制御リスト (ACL: Access Control List) のリビジョン レベル。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 指定したバイナリ形式から クラスの新しいインスタンスを初期化します。 + アクセス制御リスト (ACL: Access Control List) を表すバイト値の配列。 + データのマーシャリング解除の開始位置を示す パラメーター内のオフセット。 + + + 現在の オブジェクトのバイナリ表現の長さ (バイト単位) を取得します。 メソッドで ACL をバイナリ配列にマーシャリングする前に、この長さを使用する必要があります。 + 現在の オブジェクトのバイナリ表現の長さ (バイト単位)。 + + + 現在の オブジェクト内のアクセス制御エントリ (ACE: Access Control Entry) の数を取得します。 + 現在の オブジェクト内の ACE の数。 + + + + オブジェクトの内容を、指定したオフセットから始まる指定したバイト配列にマーシャリングします。 + + の内容のマーシャリング先のバイト配列。 + マーシャリングの開始位置を表すオフセット。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + 指定したインデックス位置に指定したアクセス制御エントリ (ACE: Access Control Entry) を挿入します。 + 新しい ACE を追加する位置。 オブジェクトの末尾に ACE を挿入するには、 プロパティの値を指定します。 + 挿入する ACE。 + + が負の値であるか、または 全体を にコピーするには大きすぎます。 + + + 指定したインデックス位置にあるアクセス制御エントリ (ACE: Access Control Entry) を取得または設定します。 + 指定したインデックス位置にある ACE。 + 取得または設定する ACE の、0 から始まるインデックス番号。 + + + 指定した位置にあるアクセス制御エントリ (ACE: Access Control Entry) を削除します。 + 削除する ACE の 0 から始まるインデックス。 + + パラメーターの値が プロパティの値から 1 を引いた値より大きいか、または負の値です。 + + + + のリビジョン レベルを取得します。 + + のリビジョン レベルを指定するバイト値。 + + + セキュリティ記述子を表します。セキュリティ記述子には、所有者、プライマリ グループ、随意アクセス制御リスト (DACL: Discretionary Access Control List)、システム アクセス制御リスト (SACL: System Access Control List) が含まれます。 + + + 指定したバイト値の配列から クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトの作成元となるバイト値の配列。 + コピーの開始位置を示す 配列内のオフセット。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトの動作を示すフラグ。 + 新しい オブジェクトの所有者。 + 新しい オブジェクトのプライマリ グループ。 + 新しい オブジェクトの システム アクセス制御リスト (SACL)。 + 新しい オブジェクトの随意アクセス制御リスト (DACL)。 + + + 指定した SDDL (Security Descriptor Definition Language) 文字列から クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトの作成元の SDDL 文字列。 + + + + オブジェクトの動作を示す値を取得します。 + 論理 OR 操作と結合した 列挙体の 1 つ以上の値。 + + + この オブジェクトの随意アクセス制御リスト (DACL) を取得または設定します。DACL にはアクセス規則が格納されます。 + この オブジェクトの DACL。 + + + この オブジェクトのプライマリ グループを取得または設定します。 + この オブジェクトのプライマリ グループ。 + + + この オブジェクトに関連付けられているオブジェクトの所有者を取得または設定します。 + この オブジェクトに関連付けられているオブジェクトの所有者。 + + + この オブジェクトに関連付けられたリソース マネージャー コントロール ビットを表すバイト値を取得または設定します。 + この オブジェクトに関連付けられたリソース マネージャー コントロール ビットを表すバイト値。 + + + この オブジェクトの プロパティを指定した値に設定します。 + 論理 OR 操作と結合した 列挙体の 1 つ以上の値。 + + + この オブジェクトのシステム アクセス制御リスト (SACL: System Access Control List) を取得または設定します。SACL には監査規則が格納されます。 + この オブジェクトの SACL。 + + + 定義済みのネイティブなオブジェクト型を指定します。 + + + ディレクトリ サービス (DS: Directory Service) オブジェクト、またはディレクトリ サービス オブジェクトのプロパティ セットまたはプロパティ + + + ディレクトリ サービス オブジェクト、およびそのすべてのプロパティ セットとプロパティ + + + ファイルまたはディレクトリ + + + ローカル カーネル オブジェクト + + + ネットワーク共有 + + + プリンター + + + プロバイダーによって定義されたオブジェクト + + + レジストリ キー + + + WOW64 のレジストリ エントリのオブジェクト + + + Windows サービス + + + 不明なオブジェクト型 + + + ローカル コンピューターのウィンドウ ステーションまたはデスクトップのオブジェクト + + + WMI (Windows Management Instrumentation) オブジェクト + + + 照会または設定するセキュリティ記述子のセクションを指定します。 + + + 随意アクセス制御リスト (DACL: Discretionary Access Control List) を指定します。 + + + プライマリ グループ ID を指定します。 + + + 所有者 ID を指定します。 + + + システム アクセス制御リスト (SACL: System Access Control List) を指定します。 + + + システム アクセス制御リスト (SACL: System Access Control List) を表します。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナーである場合は true。 + 新しい オブジェクトがディレクトリ オブジェクトのアクセス制御リスト (ACL: Access Control List) である場合は true。 + 新しい オブジェクトのリビジョン レベル。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 値を指定して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナーである場合は true。 + 新しい オブジェクトがディレクトリ オブジェクトのアクセス制御リスト (ACL: Access Control List) である場合は true。 + この オブジェクトが格納できるアクセス制御エントリ (ACE: Access Control Entry) の数。この数は単にヒントとして使用されます。 + + + 指定した オブジェクトからの指定した値を使用して、 クラスの新しいインスタンスを初期化します。 + 新しい オブジェクトがコンテナーである場合は true。 + 新しい オブジェクトがディレクトリ オブジェクトのアクセス制御リスト (ACL: Access Control List) である場合は true。 + 新しい オブジェクトの基になる オブジェクト。空の ACL を作成するには、null を指定します。 + + + 現在の オブジェクトに監査規則を追加します。 + 追加する監査規則の型。 + 監査規則を追加する 。 + 新しい監査規則のアクセス マスク。 + 新しい監査規則の継承プロパティを指定するフラグ。 + 新しい監査規則の継承反映プロパティを指定するフラグ。 + + + 設定を指定した監査規則を現在の オブジェクトに追加します。このメソッドは、新しい監査規則のオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL: Access Control List) に対して使用します。 + 追加する監査規則の型。 + 監査規則を追加する 。 + 新しい監査規則のアクセス マスク。 + 新しい監査規則の継承プロパティを指定するフラグ。 + 新しい監査規則の継承反映プロパティを指定するフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 新しい監査規則を適用するオブジェクトのクラスの ID。 + 新しい監査規則を継承できる子オブジェクトのクラスの ID。 + + + 現在の オブジェクトに監査規則を追加します。 + 監査規則を追加する 。 + + 新しい監査規則です。 + + + 指定した監査規則を現在の オブジェクトから削除します。 + 指定した監査規則がこのメソッドで正しく削除される場合は true。それ以外の場合は false。 + 削除する監査規則の型。 + 監査規則を削除する 。 + 削除する規則のアクセス マスク。 + 削除する規則の継承プロパティを示すフラグ。 + 削除する規則の継承反映プロパティを示すフラグ。 + + + 指定した監査規則を現在の オブジェクトから削除します。このメソッドはオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL) に対して使用します。 + 指定した監査規則がこのメソッドで正しく削除される場合は true。それ以外の場合は false。 + 削除する監査規則の型。 + 監査規則を削除する 。 + 削除する規則のアクセス マスク。 + 削除する規則の継承プロパティを示すフラグ。 + 削除する規則の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 削除された監査制御規則を適用するオブジェクトのクラスの ID。 + 削除された監査規則を継承できる子オブジェクトのクラスの ID。 + + + 指定した監査規則を現在の オブジェクトから削除します。 + 指定した監査規則がこのメソッドで正しく削除される場合は true。それ以外の場合は false。 + 監査規則を削除する 。 + 監査規則を削除する 。 + + + 指定した監査規則を現在の オブジェクトから削除します。 + 削除する監査規則の型。 + 監査規則を削除する 。 + 削除する規則のアクセス マスク。 + 削除する規則の継承プロパティを示すフラグ。 + 削除する規則の継承反映プロパティを示すフラグ。 + + + 指定した監査規則を現在の オブジェクトから削除します。このメソッドはオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL) に対して使用します。 + 削除する監査規則の型。 + 監査規則を削除する 。 + 削除する規則のアクセス マスク。 + 削除する規則の継承プロパティを示すフラグ。 + 削除する規則の継承反映プロパティを示すフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 削除された監査制御規則を適用するオブジェクトのクラスの ID。 + 削除された監査規則を継承できる子オブジェクトのクラスの ID。 + + + 指定した監査規則を現在の オブジェクトから削除します。 + 監査規則を削除する 。 + + 、規則を削除するのです。 + + + 指定した オブジェクトの指定した監査規則を設定します。 + 設定する監査条件。 + 監査規則を設定する 。 + 新しい監査規則のアクセス マスク。 + 新しい監査規則の継承プロパティを指定するフラグ。 + 新しい監査規則の継承反映プロパティを指定するフラグ。 + + + 指定した オブジェクトの指定した監査規則を設定します。このメソッドはオブジェクト型または継承されたオブジェクト型を指定する場合に、ディレクトリ オブジェクトのアクセス制御リスト (ACL) に対して使用します。 + 設定する監査条件。 + 監査規則を設定する 。 + 新しい監査規則のアクセス マスク。 + 新しい監査規則の継承プロパティを指定するフラグ。 + 新しい監査規則の継承反映プロパティを指定するフラグ。 + + パラメーターおよび パラメーターに null 以外の値が格納されているかどうかを示すフラグ。 + 新しい監査規則を適用するオブジェクトのクラスの ID。 + 新しい監査規則を継承できる子オブジェクトのクラスの ID。 + + + 指定した オブジェクトの指定した監査規則を設定します。 + 監査規則を設定する 。 + 監査規則を設定する 。 + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ko/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ko/System.Security.AccessControl.xml new file mode 100644 index 0000000..8352079 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ko/System.Security.AccessControl.xml @@ -0,0 +1,2056 @@ + + + + System.Security.AccessControl + + + + 보안 가능한 개체에 사용할 수 있는 동작을 지정합니다. + + + 쓰기 전용 액세스를 지정합니다. + + + 액세스를 지정하지 않습니다. + + + 읽기 전용 액세스를 지정합니다. + + + 수행할 액세스 제어 수정의 형식을 지정합니다.이 열거형은 클래스 및 해당 하위 항목의 메서드에서 사용됩니다. + + + 지정한 권한 부여 규칙을 ACL(액세스 제어 목록)에 추가합니다. + + + ACL에서 지정한 권한 부여 규칙과 동일한 SID(보안 식별자) 및 액세스 마스크가 들어 있는 권한 부여 규칙을 제거합니다. + + + ACL에서 지정한 권한 부여 규칙과 동일한 SID가 들어 있는 권한 부여 규칙을 제거합니다. + + + ACL에서 지정한 권한 부여 규칙과 정확히 일치하는 권한 부여 규칙을 제거합니다. + + + ACL에서 지정한 권한 부여 규칙과 동일한 SID가 들어 있는 권한 부여 규칙을 제거한 다음 지정한 권한 부여 규칙을 ACL에 추가합니다. + + + ACL에서 모든 권한 부여 규칙을 제거한 다음 지정한 권한 부여 규칙을 ACL에 추가합니다. + + + 저장하거나 로드할 보안 설명자 섹션을 지정합니다. + + + DACL(임의 액세스 제어 목록)입니다. + + + 전체 보안 설명자입니다. + + + SACL(시스템 액세스 제어 목록)입니다. + + + 기본 그룹입니다. + + + 섹션이 없습니다. + + + 소유자입니다. + + + + 개체를 액세스 허용에 사용할지 아니면 액세스 거부에 사용할지 지정합니다.이러한 값은 플래그가 아니며 조합할 수 없습니다. + + + + 개체는 보안 개체에 대한 액세스를 허용하는 데 사용됩니다. + + + + 개체는 보안 개체에 대한 액세스를 거부하는 데 사용됩니다. + + + 사용자의 ID, 액세스 마스크 및 액세스 제어 형식(허용 또는 거부)의 조합을 나타냅니다.또한 개체는 자식 개체가 규칙을 상속하는 방식과 해당 상속이 전파되는 방식에 대한 정보를 포함합니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다.이 매개 변수는 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 액세스 규칙의 상속 속성입니다. + 상속된 액세스 규칙이 자동으로 전파되는지 여부입니다.으로 설정되면 전파 플래그는 무시됩니다. + 유효한 액세스 제어 형식입니다. + + 매개 변수 값이 로 캐스팅될 수 없거나 매개 변수에 잘못된 값이 포함된 경우 + + 매개 변수 값이 0이거나 또는 매개 변수에 인식할 수 없는 플래그 값이 포함된 경우 + + + 개체와 관련된 값을 가져옵니다. + 개체와 관련된 값입니다. + + + 사용자의 ID, 액세스 마스크 및 액세스 제어 형식(허용 또는 거부)의 조합을 나타냅니다.또한 AccessRule`1 개체는 자식 개체가 규칙을 상속하는 방식과 해당 상속이 전파되는 방식에 대한 정보를 포함합니다. + 액세스 규칙에 대한 액세스 권한 형식입니다. + + + 지정된 값을 사용하여 AccessRule’1 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. + 액세스 규칙의 권한입니다. + 유효한 액세스 제어 형식입니다. + + + 지정된 값을 사용하여 AccessRule’1 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. + 액세스 규칙의 권한입니다. + 액세스 규칙의 상속 속성입니다. + 상속된 액세스 규칙이 자동으로 전파되는지 여부입니다.으로 설정되면 전파 플래그는 무시됩니다. + 유효한 액세스 제어 형식입니다. + + + 지정된 값을 사용하여 AccessRule’1 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. + 액세스 규칙의 권한입니다. + 유효한 액세스 제어 형식입니다. + + + 지정된 값을 사용하여 AccessRule’1 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. + 액세스 규칙의 권한입니다. + 액세스 규칙의 상속 속성입니다. + 상속된 액세스 규칙이 자동으로 전파되는지 여부입니다.으로 설정되면 전파 플래그는 무시됩니다. + 유효한 액세스 제어 형식입니다. + + + 현재 인스턴스의 권한을 가져옵니다. + 현재 인스턴스의 권한으로, 형식 <T>로 캐스팅됩니다. + + + ACL(액세스 제어 목록)의 ACE(액세스 제어 항목)를 반복하는 기능을 제공합니다. + + + + 컬렉션의 현재 요소를 가져옵니다.이 속성은 익숙한 형식의 개체 버전을 가져옵니다. + + 컬렉션의 현재 요소입니다. + + + 열거자를 컬렉션의 다음 요소로 이동합니다. + 열거자가 다음 요소로 이동한 경우 true가 반환되고, 컬렉션의 끝을 지난 경우 false가 반환됩니다. + 열거자가 만들어진 후 컬렉션이 수정된 경우 + + + + 컬렉션의 첫 번째 요소 앞의 초기 위치에 열거자를 설정합니다. + 열거자가 만들어진 후 컬렉션이 수정된 경우 + + + + ACE(액세스 제어 항목)의 상속 및 감사 동작을 지정합니다. + + + 모든 액세스 시도를 감사합니다. + + + 액세스 마스크는 자식 컨테이너 개체로 전파됩니다. + + + 실패한 액세스 시도를 감사합니다. + + + + , , 의 논리 OR입니다. + + + ACE는 개체에 대해 명시적으로 설정되지 않고 부모 컨테이너에서 상속됩니다. + + + 액세스 마스크는 자식 개체로만 전파됩니다.여기에는 컨테이너와 리프 자식 개체도 모두 포함됩니다. + + + ACE 플래그가 설정되지 않습니다. + + + 액세스 검사는 개체에 적용되는 것이 아니라 개체의 자식에만 적용됩니다. + + + 액세스 마스크는 자식 리프 개체로 전파됩니다. + + + 성공한 액세스 시도를 감사합니다. + + + ACE(액세스 제어 항목)의 함수를 지정합니다. + + + 액세스를 허용합니다. + + + 액세스를 거부합니다. + + + 시스템 경고를 발생시킵니다. + + + 시스템 감사를 발생시킵니다. + + + 사용 가능한 ACE(액세스 제어 항목) 형식을 정의합니다. + + + + 개체로 식별되는 특정 트러스티의 개체에 대한 액세스를 허용합니다. + + + + 개체로 식별되는 특정 트러스티의 개체에 대한 액세스를 허용합니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 개체, 속성 집합 또는 속성에 대한 액세스를 허용합니다.이 ACE는 액세스 권한 집합, 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 부여할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 정의되어 있지만 사용되지는 않습니다.편의를 위해 제공되었습니다. + + + 개체, 속성 집합 또는 속성에 대한 액세스를 허용합니다.이 ACE는 액세스 권한 집합, 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 부여할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다. + + + + 개체로 식별되는 특정 트러스티의 개체에 대한 액세스를 거부합니다. + + + + 개체로 식별되는 특정 트러스티의 개체에 대한 액세스를 거부합니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 개체, 속성 집합 또는 속성에 대한 액세스를 거부합니다.이 ACE는 액세스 권한 집합, 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 부여할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 개체, 속성 집합 또는 속성에 대한 액세스를 거부합니다.이 ACE는 액세스 권한 집합, 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 부여할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다. + + + 열거형에 정의되어 있는 최대 ACE 형식을 추적합니다. + + + 다음에 사용하도록 예약됩니다. + + + 다음에 사용하도록 예약됩니다. + + + 다음에 사용하도록 예약됩니다. + + + 다음에 사용하도록 예약됩니다. + + + 지정된 트러스티가 개체에 대한 액세스 권한을 얻으려고 시도할 때 감사 메시지가 기록되도록 합니다.트러스티는 개체로 식별됩니다. + + + 지정된 트러스티가 개체에 대한 액세스 권한을 얻으려고 시도할 때 감사 메시지가 기록되도록 합니다.트러스티는 개체로 식별됩니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 지정된 트러스티가 속성 집합이나 속성 같은 개체나 하위 개체에 대한 액세스 권한을 얻으려고 시도할 때 감사 메시지가 기록되도록 합니다.이 ACE는 액세스 권한 집합, 개체 또는 하위 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 감사할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다.이 ACE 형식은 선택적인 콜백 데이터를 포함할 수 있습니다.콜백 데이터는 해석되지 않은 리소스 관리자별 BLOB입니다. + + + 지정된 트러스티가 속성 집합이나 속성 같은 개체나 하위 개체에 대한 액세스 권한을 얻으려고 시도할 때 감사 메시지가 기록되도록 합니다.이 ACE는 액세스 권한 집합, 개체 또는 하위 개체의 형식을 식별하는 GUID 및 시스템에서 액세스 권한을 감사할 트러스티를 식별하는 개체를 포함합니다.ACE에는 또한 GUID와 자식 개체의 ACE 상속을 제어하는 플래그 집합이 포함되어 있습니다. + + + 보안 개체 액세스 시도를 감사하기 위한 조건을 지정합니다. + + + 실패한 액세스 시도가 감사됩니다. + + + 어떠한 액세스 시도도 감사되지 않습니다. + + + 성공한 액세스 시도가 감사됩니다. + + + 사용자의 ID와 액세스 마스크의 조합을 나타냅니다.또한 개체에는 자식 개체에서 규칙을 상속하는 방법, 상속을 전파하는 방법 및 감사 조건에 대한 정보가 들어 있습니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 감사 규칙이 적용되는 ID입니다.이 값은 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 감사 규칙의 상속 속성입니다. + 상속된 감사 규칙을 자동으로 전파할 것인지 여부를 나타냅니다.으로 설정되면 전파 플래그는 무시됩니다. + 규칙의 감사 조건입니다. + + 매개 변수 값을 로 캐스팅할 수 없거나 매개 변수에 잘못된 값이 포함되어 있는 경우 + + 매개 변수 값이 0이거나 또는 매개 변수에 인식할 수 없는 플래그 값이 포함된 경우 + + + 이 감사 규칙의 감사 플래그를 가져옵니다. + 열거형 값의 비트 조합입니다.이 조합은 이 감사 규칙의 감사 조건을 지정합니다. + + + 사용자의 ID와 액세스 마스크의 조합을 나타냅니다. + + + + 지정된 값을 사용하여 AuditRule’1 클래스의 새 인스턴스를 초기화합니다. + 이 감사 규칙이 적용되는 ID입니다. + 감사 규칙의 권한입니다. + 규칙의 감사 조건입니다. + + + 지정된 값을 사용하여 AuditRule’1 클래스의 새 인스턴스를 초기화합니다. + 감사 규칙이 적용되는 ID입니다. + 감사 규칙의 권한입니다. + 감사 규칙의 상속 속성입니다. + 상속된 감사 규칙을 자동으로 전파할 것인지 여부를 나타냅니다. + 규칙의 감사 조건입니다. + + + 지정된 값을 사용하여 AuditRule’1 클래스의 새 인스턴스를 초기화합니다. + 감사 규칙이 적용되는 ID입니다. + 감사 규칙의 권한입니다. + 감사 규칙의 속성입니다. + + + 지정된 값을 사용하여 AuditRule’1 클래스의 새 인스턴스를 초기화합니다. + 감사 규칙이 적용되는 ID입니다. + 감사 규칙의 권한입니다. + 감사 규칙의 상속 속성입니다. + 상속된 감사 규칙을 자동으로 전파할 것인지 여부를 나타냅니다. + 규칙의 감사 조건입니다. + + + 감사 규칙의 권한입니다. + + 를 반환합니다. + + + 보안 가능한 개체에 대한 액세스를 결정합니다.파생 클래스 은 특수 액세스 및 감사 기능을 제공합니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. 이 매개 변수는 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 액세스 규칙의 상속 속성입니다. + 상속된 액세스 규칙이 자동으로 전파되는지 여부입니다.으로 설정되면 전파 플래그는 무시됩니다. + + 매개 변수 값을 로 캐스팅할 수 없는 경우 + + 매개 변수 값이 0이거나 또는 매개 변수에 인식할 수 없는 플래그 값이 포함된 경우 + + + 이 규칙의 액세스 마스크를 가져옵니다. + 이 규칙의 액세스 마스크입니다. + + + 이 규칙을 적용할 를 가져옵니다. + 이 규칙을 적용할 입니다. + + + 이 규칙이 자식 개체에서 상속되는 방법을 결정하는 플래그 값을 가져옵니다. + 열거형 값의 비트 조합입니다. + + + 이 규칙을 명시적으로 설정할 것인지, 아니면 부모 컨테이너 개체에서 상속할 것인지 여부를 나타내는 값을 가져옵니다. + 이 규칙을 명시적으로 설정하지 않고 부모 컨테이너에서 상속하면 true입니다. + + + 이 규칙의 상속을 자식 개체로 전파하는 방법을 결정하는 전파 플래그 값을 가져옵니다.이 속성은 열거형 값이 이 아닌 경우에만 의미를 가집니다. + 열거형 값의 비트 조합입니다. + + + + 개체의 컬렉션을 나타냅니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + 컬렉션에 개체를 추가합니다. + 컬렉션에 추가할 개체입니다. + + + 컬렉션의 내용을 배열에 복사합니다. + 컬렉션의 내용을 복사할 배열입니다. + 복사가 시작되는 인덱스(0부터 시작)입니다. + + + + 컬렉션의 지정된 인덱스에서 개체를 가져옵니다. + 지정된 인덱스의 개체입니다. + 가져올 개체의 인덱스(0부터 시작)입니다. + + + + + + + ACE(액세스 제어 항목)를 나타냅니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 새 ACE(액세스 제어 항목)의 상속, 상속 전파 및 감사 조건에 대한 정보를 지정하는 플래그입니다. + 새 ACE의 사용 방법입니다. + ACE의 액세스 마스크입니다. + 새 ACE와 관련된 입니다. + 새 ACE가 콜백 형식 ACE임을 지정하려면 true입니다. + 새 ACE와 관련된 불투명 데이터입니다.불투명 데이터는 콜백 ACE 형식에만 허용됩니다.이 배열의 길이는 메서드의 반환 값보다 크지 않아야 합니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 ACL을 이진 배열로 마샬링하기 전에 메서드와 함께 사용합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 개체의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 이 음수이거나, 너무 커서 전체 배열에 복사할 수 없는 경우 + + + 콜백 ACE(액세스 제어 항목)에 대해 불투명 데이터 BLOB의 최대 허용 길이를 가져옵니다. + 불투명 데이터 BLOB의 허용 길이입니다. + + 개체가 콜백 ACE 형식임을 지정하려면 true입니다. + + + ACL(액세스 제어 목록)을 나타내며 클래스의 기본 클래스입니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL(액세스 제어 목록)을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + 현재 개체의 ACE(액세스 제어 항목) 수를 가져옵니다. + 현재 개체의 ACE 수입니다. + + + + 개체의 내용을 특정 오프셋에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + + 현재 개체의 ACE(액세스 제어 항목)가 정식 순서대로 되어 있는지 여부를 지정하는 부울 값을 가져옵니다. + 현재 개체의 ACE가 정식 순서대로 되어 있으면 true이고, 그렇지 않으면 false입니다. + + + + 개체가 컨테이너인지 여부를 설정합니다. + 현재 개체가 컨테이너이면 true입니다. + + + 현재 개체가 디렉터리 개체 ACL(액세스 제어 목록)인지 여부를 설정합니다. + 현재 개체가 디렉터리 개체 ACL이면 true입니다. + + + 지정된 인덱스에 있는 를 가져오거나 설정합니다. + 지정된 인덱스의 입니다. + 가져오거나 설정할 의 인덱스(0부터 시작)입니다. + + + 지정한 개체와 관련되어 있으며 이 개체에 포함된 모든 ACE(액세스 제어 항목)를 제거합니다. + 확인할 개체입니다. + + + 개체에서 상속된 모든 ACE(액세스 제어 항목)를 제거합니다. + + + + 의 수정 수준을 가져옵니다. + + 의 수정 수준을 지정하는 바이트 값입니다. + + + ACL(액세스 제어 목록)을 직접 조작하지 않고 개체에 대한 액세스를 제어합니다.이 클래스는 클래스에 대한 추상 기본 클래스입니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 새 개체가 컨테이너 개체이면 true입니다. + + + 지정한 액세스 규칙을 이 개체와 관련된 DACL(임의 액세스 제어 목록)에 추가합니다. + 추가할 액세스 규칙입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에 지정된 감사 규칙을 추가합니다. + 추가할 감사 규칙입니다. + + + 지정된 보안 식별자와 관련된 액세스 규칙 컬렉션을 가져옵니다. + 지정된 개체와 관련된 액세스 규칙 컬렉션입니다. + 개체에 대해 명시적으로 설정된 액세스 규칙을 포함시키려면 true입니다. + 상속된 액세스 규칙을 포함시키려면 true입니다. + 액세스 규칙을 검색할 보안 식별자가 T:System.Security.Principal.SecurityIdentifier 형식인지 T:System.Security.Principal.NTAccount 형식인지 여부를 지정합니다.이 매개 변수의 값은 형식으로 변환 가능한 형식이어야 합니다. + + + + + + 지정된 보안 식별자와 관련된 감사 규칙 컬렉션을 가져옵니다. + 지정된 개체와 관련된 감사 규칙 컬렉션입니다. + 개체에 대해 명시적으로 설정된 감사 규칙을 포함시키려면 true입니다. + 상속된 감사 규칙을 포함시키려면 true입니다. + 감사 규칙을 검색할 보안 식별자입니다.이 값은 개체로 캐스팅할 수 있는 개체여야 합니다. + + + + + + 지정된 수정 사항을 이 개체와 관련된 DACL(임의 액세스 제어 목록)에 적용합니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + DACL에 적용할 수정 내용입니다. + 수정할 액세스 규칙입니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에 지정된 수정 내용을 적용합니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + SACL에 적용할 수정 내용입니다. + 수정할 감사 규칙입니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자 및 액세스 마스크가 들어 있는 액세스 규칙을 제거합니다. + 액세스 규칙이 성공적으로 제거되었으면 true이고, 그렇지 않으면 false입니다. + 제거할 액세스 규칙입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자가 있는 모든 액세스 규칙을 제거합니다. + 제거할 액세스 규칙입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 정확히 일치하는 모든 액세스 규칙을 제거합니다. + 제거할 액세스 규칙입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자 및 액세스 마스크를 포함하는 액세스 규칙을 제거합니다. + 감사 규칙이 성공적으로 제거되었으면 true이고, 그렇지 않으면 false입니다. + 제거할 감사 규칙입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자를 갖는 모든 감사 규칙을 제거합니다. + 제거할 감사 규칙입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 정확히 일치하는 모든 감사 규칙을 제거합니다. + 제거할 감사 규칙입니다. + + + + 개체와 관련된 DACL(임의 액세스 제어 목록)의 모든 액세스 규칙을 제거한 다음 지정한 액세스 규칙을 추가합니다. + 재설정할 액세스 규칙입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자 및 한정자가 들어 있는 모든 액세스 규칙을 제거한 다음 지정한 액세스 규칙을 추가합니다. + 설정할 액세스 규칙입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자 및 한정자를 포함하는 모든 감사 규칙을 제거한 후 지정한 감사 규칙을 추가합니다. + 설정할 감사 규칙입니다. + + + 보안 설명자를 나타냅니다.보안 설명자에는 소유자, 주 그룹, DACL(임의 액세스 제어 목록) 및 SACL(시스템 액세스 제어 목록)이 포함됩니다. + + + 지정된 바이트 값 배열을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 새 보안 설명자가 컨테이너 개체와 관련되어 있는 경우 true입니다. + 새 보안 설명자가 디렉터리 개체와 관련되어 있는 경우 true입니다. + 개체를 만들 바이트 값 배열입니다. + + 배열에서 복사를 시작할 오프셋입니다. + + + 지정된 정보에서 클래스의 새 인스턴스를 초기화합니다. + 새 보안 설명자가 컨테이너 개체와 관련되어 있는 경우 true입니다. + 새 보안 설명자가 디렉터리 개체와 관련되어 있는 경우 true입니다. + 개체의 동작을 지정하는 플래그입니다. + 개체의 소유자입니다. + 개체의 주 그룹입니다. + 개체의 SACL(시스템 액세스 제어 목록)입니다. + 개체의 DACL(임의 액세스 제어 목록)입니다. + + + 지정된 개체에서 클래스의 새 인스턴스를 초기화합니다. + 새 보안 설명자가 컨테이너 개체와 관련되어 있는 경우 true입니다. + 새 보안 설명자가 디렉터리 개체와 관련되어 있는 경우 true입니다. + 개체를 만들 개체입니다. + + + 지정한 SDDL(Security Descriptor Definition Language) 문자열에서 클래스의 새 인스턴스를 초기화합니다. + 새 보안 설명자가 컨테이너 개체와 관련되어 있는 경우 true입니다. + 새 보안 설명자가 디렉터리 개체와 관련되어 있는 경우 true입니다. + 개체를 만들 SDDL 문자열입니다. + + + 설정의 이 대 한 속성 인스턴스 및 설정의 플래그입니다. + 개체의 수정 수준입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 설정의 이 대 한 속성 인스턴스 및 설정의 플래그입니다. + 개체의 수정 수준입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + + 개체의 동작을 지정하는 값을 가져옵니다. + 논리 OR 연산으로 조합된 열거형의 하나 이상의 값입니다. + + + 개체의 DACL(임의 액세스 제어 목록)을 가져오거나 설정합니다.DACL에는 액세스 규칙이 포함되어 있습니다. + 개체의 DACL입니다. + + + 개체의 주 그룹을 가져오거나 설정합니다. + 개체의 주 그룹입니다. + + + 개체와 관련된 개체가 컨테이너 개체인지 여부를 지정하는 부울 값을 가져옵니다. + 개체와 관련된 개체가 컨테이너 개체이면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)이 정식 순서대로 되어 있는지 여부를 지정하는 부울 값을 가져옵니다. + 개체와 관련된 DACL이 정식 순서대로 되어 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 개체가 디렉터리 개체인지 여부를 지정하는 부울 값을 가져옵니다. + 개체와 관련된 개체가 디렉터리 개체이면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)이 정식 순서대로 되어 있는지 여부를 지정하는 부울 값을 가져옵니다. + 개체와 관련된 SACL이 정식 순서대로 되어 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 개체의 소유자를 가져오거나 설정합니다. + 개체와 관련된 개체의 소유자입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정된 보안 식별자에 대한 모든 액세스 규칙을 제거합니다. + 액세스 규칙을 제거할 보안 식별자입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 보안 식별자에 대한 모든 감사 규칙을 제거합니다. + 감사 규칙을 제거할 보안 식별자입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)에 대해 상속 보호를 설정합니다.보호된 DACL은 부모 컨테이너에서 액세스 규칙을 상속하지 않습니다. + 상속으로부터 DACL을 보호하려면 true입니다. + DACL에 상속된 액세스 규칙을 유지하려면 true이고, DACL에서 상속된 액세스 규칙을 제거하려면 false입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)에 대해 상속 보호를 설정합니다.보호된 SACL은 부모 컨테이너에서 감사 규칙을 상속하지 않습니다. + 상속으로부터 SACL을 보호하려면 true입니다. + SACL에 상속된 감사 규칙을 유지하려면 true이고, SACL에서 상속된 감사 규칙을 제거하려면 false입니다. + + + 개체의 SACL(시스템 액세스 제어 목록)을 가져오거나 설정합니다.SACL에는 감사 규칙이 포함되어 있습니다. + 개체의 SACL입니다. + + + 복합 ACE(액세스 제어 항목)를 나타냅니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 새 ACE(액세스 제어 항목)의 상속, 상속 전파 및 감사 조건에 대한 정보를 지정하는 플래그가 포함되어 있습니다. + ACE의 액세스 마스크입니다. + + 열거형의 값입니다. + 새 ACE와 관련된 입니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + 개체의 형식을 가져오거나 설정합니다. + 개체의 형식입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + + 개체의 형식을 지정합니다. + + + + 개체는 가장에 사용됩니다. + + + 이 플래그는 보안 설명자의 동작에 영향을 줍니다. + + + DACL(임의 액세스 제어 목록)이 부모에서 자동으로 상속되었음을 지정합니다.리소스 관리자에 의해서만 설정됩니다. + + + 무시합니다. + + + DACL을 기본 메커니즘을 통해 가져왔음을 지정합니다.리소스 관리자에 의해서만 설정됩니다. + + + DACL이 null이 아님을 지정합니다.리소스 관리자나 사용자가 설정합니다. + + + 리소스 관리자에 의해 자동 상속을 사용할 수 없음을 지정합니다.리소스 관리자나 사용자가 설정합니다. + + + 무시합니다. + + + + 그룹을 기본 메커니즘을 통해 가져왔음을 지정합니다.리소스 관리자에 의해서만 설정되며, 호출자는 설정하면 안 됩니다. + + + 제어 플래그가 없습니다. + + + 소유자 를 기본 메커니즘을 통해 가져왔음을 지정합니다.리소스 관리자에 의해서만 설정되며, 호출자는 설정하면 안 됩니다. + + + 예약 필드의 내용이 올바르다는 것을 지정합니다. + + + 보안 설명자 이진 표시가 자체 상대 형식임을 지정합니다. 이 플래그는 항상 설정되어 있습니다. + + + 무시합니다. + + + SACL(시스템 액세스 제어 목록)이 부모에서 자동으로 상속되었음을 지정합니다.리소스 관리자에 의해서만 설정됩니다. + + + 무시합니다. + + + SACL을 기본 메커니즘을 통해 가져왔음을 지정합니다.리소스 관리자에 의해서만 설정됩니다. + + + DACL이 null이 아님을 지정합니다.리소스 관리자나 사용자가 설정합니다. + + + 리소스 관리자에 의해 자동 상속을 사용할 수 없음을 지정합니다.리소스 관리자나 사용자가 설정합니다. + + + + 열거형 멤버 중 하나에 의해 정의되지 않은 ACE(액세스 제어 항목)를 나타냅니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 새 ACE(액세스 제어 항목) 형식입니다.이 값은 보다 커야 합니다. + 새 ACE의 상속, 상속 전파 및 감사 조건에 대한 정보를 지정하는 플래그입니다. + 새 ACE의 데이터가 포함된 바이트 값의 배열입니다.이 값은 null일 수 있습니다.이 배열의 길이는 필드 값보다 크지 않아야 하며 4의 배수여야 합니다. + + 매개 변수 값이 보다 크지 않거나 배열의 길이가 필드 값보다 크거나 4의 배수가 아닌 경우 + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + 개체와 관련된 불투명 데이터를 반환합니다. + 개체와 관련된 불투명 데이터를 나타내는 바이트 값의 배열입니다. + + + 개체에 대한 불투명 데이터 BLOB의 최대 허용 길이를 반환합니다. + + + 개체와 관련된 불투명 데이터의 길이를 가져옵니다. + 불투명 콜백 데이터의 길이입니다. + + + 개체와 관련된 불투명 콜백 데이터를 설정합니다. + 개체의 불투명 콜백 데이터를 나타내는 바이트 값의 배열입니다. + + + DACL(임의 액세스 제어 목록)을 나타냅니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 개체의 수정 수준입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 지정된 개체의 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object.null을 지정하여 빈 ACL을 만듭니다. + + + 지정된 설정의 ACE(액세스 제어 항목)를 현재 개체에 추가합니다. + 추가할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 추가할 입니다. + 새 ACE에 대한 액세스 규칙입니다. + 새 ACE의 상속 속성을 지정하는 플래그입니다. + 새 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정된 설정의 ACE(액세스 제어 항목)를 현재 개체에 추가합니다.이 메서드는 새 ACE의 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 추가할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 추가할 입니다. + 새 ACE에 대한 액세스 규칙입니다. + 새 ACE의 상속 속성을 지정하는 플래그입니다. + 새 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 새 ACE가 적용되는 개체 클래스의 ID입니다. + 새 ACE를 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정된 설정의 ACE(액세스 제어 항목)를 현재 개체에 추가합니다. + 추가할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 추가할 입니다. + + 에 대 한 새로운 액세스 합니다. + + + 지정한 액세스 제어 규칙을 현재 개체에서 제거합니다. + 지정한 액세스 권한이 이 메서드로 제거되면 true이고, 그렇지 않으면 false입니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + 액세스 제어 규칙을 제거할 입니다. + 제거할 규칙에 대한 액세스 마스크입니다. + 제거할 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정한 액세스 제어 규칙을 현재 개체에서 제거합니다.이 메서드는 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 지정한 액세스 권한이 이 메서드로 제거되면 true이고, 그렇지 않으면 false입니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + 액세스 제어 규칙을 제거할 입니다. + 제거할 액세스 제어 규칙에 대한 액세스 마스크입니다. + 제거할 액세스 제어 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 액세스 제어 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 제거한 액세스 제어 규칙이 적용되는 개체 클래스의 ID입니다. + 제거한 액세스 제어 규칙을 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정한 액세스 제어 규칙을 현재 개체에서 제거합니다. + + 를 반환합니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + 액세스 제어 규칙을 제거할 입니다. + + 액세스 권한을 제거할입니다. + + + 지정한 ACE(액세스 제어 항목)를 현재 개체에서 제거합니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 제거할 입니다. + 제거할 ACE에 대한 액세스 마스크입니다. + 제거할 ACE의 상속 속성을 지정하는 플래그입니다. + 제거할 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정한 ACE(액세스 제어 항목)를 현재 개체에서 제거합니다.이 메서드는 제거할 ACE의 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 제거할 입니다. + 제거할 ACE에 대한 액세스 마스크입니다. + 제거할 ACE의 상속 속성을 지정하는 플래그입니다. + 제거할 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 제거한 ACE가 적용되는 개체 클래스의 ID입니다. + 제거한 ACE를 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정한 ACE(액세스 제어 항목)를 현재 개체에서 제거합니다. + 제거할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 제거할 입니다. + + 액세스 권한을 제거할입니다. + + + 지정된 개체에 대해 지정된 액세스 제어를 설정합니다. + 설정할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 설정할 입니다. + 새 ACE에 대한 액세스 규칙입니다. + 새 ACE의 상속 속성을 지정하는 플래그입니다. + 새 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정된 개체에 대해 지정된 액세스 제어를 설정합니다. + 설정할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 설정할 입니다. + 새 ACE에 대한 액세스 규칙입니다. + 새 ACE의 상속 속성을 지정하는 플래그입니다. + 새 ACE의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 새 ACE가 적용되는 개체 클래스의 ID입니다. + 새 ACE를 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정된 개체에 대해 지정된 액세스 제어를 설정합니다. + 설정할 액세스 제어 형식(허용 또는 거부)입니다. + ACE를 설정할 입니다. + + 액세스 설정입니다. + + + ACE(액세스 제어 항목)를 나타내며 다른 모든 ACE 클래스의 기본 클래스입니다. + + + 개체와 관련된 를 가져오거나 설정합니다. + 개체와 관련된 입니다. + + + 이 ACE(액세스 제어 항목)의 형식을 가져옵니다. + 이 ACE의 형식입니다. + + + 이 ACE(액세스 제어 항목)와 관련된 감사 정보를 가져옵니다. + 이 ACE(액세스 제어 항목)와 관련된 감사 정보입니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + 이 ACE(액세스 제어 항목)의 전체 복사본을 만듭니다. + 이 메서드가 만드는 개체를 반환합니다. + + + 지정된 이진 데이터에서 개체를 만듭니다. + 이 메서드가 만드는 개체를 반환합니다. + 개체를 만들 이진 데이터입니다. + 역마샬링을 시작할 오프셋입니다. + + + 지정된 개체가 현재 개체와 같은지 여부를 확인합니다. + 지정한 개체가 현재 개체와 같으면 true이고, 그렇지 않으면 false입니다. + 현재 개체와 비교할 개체입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + + 클래스에 대한 해시 함수 역할을 합니다. 메서드는 해시 테이블과 같은 해시 알고리즘 및 데이터 구조에 적합합니다. + 현재 개체의 해시 코드입니다. + + + 이 ACE(액세스 제어 항목)의 상속 속성을 지정하는 플래그를 가져옵니다. + 이 ACE(액세스 제어 항목)의 상속 속성을 지정하는 플래그입니다. + + + 이 ACE(액세스 제어 항목)를 상속할 것인지 또는 명시적으로 설정할 것인지를 지정하는 부울 값을 가져옵니다. + ACE가 상속된 경우 true이고, 그렇지 않으면 false입니다. + + + 지정한 개체가 동일한지 여부를 확인합니다. + 개체가 같으면 true이고, 그렇지 않으면 false입니다. + 비교할 첫 번째 개체입니다. + 비교할 두 번째 입니다. + + + 지정한 개체가 같지 않은지 여부를 확인합니다. + 개체가 같지 않으면 true이고, 그렇지 않으면 false입니다. + 비교할 첫 번째 개체입니다. + 비교할 두 번째 입니다. + + + 이 ACE(액세스 제어 항목)의 상속 전파 속성을 지정하는 플래그를 가져옵니다. + 이 ACE(액세스 제어 항목)의 상속 전파 속성을 지정하는 플래그입니다. + + + ACL(액세스 제어 목록)을 나타내며 , , 클래스의 기본 클래스입니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + 현재 의 수정 수준입니다.이 값은 디렉터리 서비스 개체와 관련되지 않은 ACL(액세스 제어 목록)의 속성에 의해 반환됩니다. + + + 현재 의 수정 수준입니다.이 값은 디렉터리 서비스 개체와 관련된 ACL(액세스 제어 목록)의 속성에 의해 반환됩니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + 현재 의 각 를 지정된 배열에 복사합니다. + 현재 에 포함된 개체의 복사본을 넣을 대상 배열입니다. + 복사를 시작하는 의 인덱스(0부터 시작)입니다. + + + 현재 개체의 ACE(액세스 제어 항목) 수를 가져옵니다. + 현재 개체의 ACE 수입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + + 클래스의 새 인스턴스를 반환합니다. + 이 메서드가 반환하는 입니다. + + + 이 속성은 항상 false로 설정됩니다.또한 인터페이스의 구현에 사용하기 위해서만 구현됩니다. + 항상 false입니다. + + + 지정된 인덱스에 있는 를 가져오거나 설정합니다. + 지정된 인덱스에 있는 입니다. + 가져오거나 설정할 의 인덱스(0부터 시작)입니다. + + + + 개체의 최대 허용 이진 길이입니다. + + + + 의 수정 수준을 가져옵니다. + + 의 수정 수준을 지정하는 바이트 값입니다. + + + 이 속성은 항상 null를 반환합니다.또한 인터페이스의 구현에 사용하기 위해서만 구현됩니다. + 항상 null를 반환합니다. + + + 현재 의 각 를 지정된 배열에 복사합니다. + 현재 에 포함된 개체의 복사본을 넣을 대상 배열입니다. + 복사를 시작하는 의 인덱스(0부터 시작)입니다. + + + + 인터페이스의 인스턴스로 캐스팅된 클래스의 새 인스턴스를 반환합니다. + + 인터페이스의 인스턴스로 캐스팅된 새 개체입니다. + + + 보안 설명자를 나타냅니다.보안 설명자에는 소유자, 주 그룹, DACL(임의 액세스 제어 목록) 및 SACL(시스템 액세스 제어 목록)이 포함됩니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + + 개체의 동작을 지정하는 값을 가져옵니다. + 논리 OR 연산으로 조합된 열거형의 하나 이상의 값입니다. + + + 개체에 포함된 정보를 나타내는 바이트 값 배열을 반환합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + 개체가 나타내는 지정된 보안 설명자 섹션의 SDDL(Security Descriptor Definition Language) 표현을 반환합니다. + 개체와 관련된 지정된 보안 설명자 섹션의 SDDL 표현입니다. + 가져올 보안 설명자 섹션(액세스 규칙, 감사 규칙, 주 그룹 및 소유자)을 지정합니다. + + + 개체의 주 그룹을 가져오거나 설정합니다. + 개체의 주 그룹입니다. + + + 개체와 관련된 보안 설명자를 SDDL(Security Descriptor Definition Language) 형식으로 변환할 수 있는지 여부를 지정하는 부울 값을 반환합니다. + 개체와 관련된 보안 설명자를 SDDL(Security Descriptor Definition Language) 형식으로 변환할 수 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 개체의 소유자를 가져오거나 설정합니다. + 개체와 관련된 개체의 소유자입니다. + + + + 개체의 수정 수준을 가져옵니다. + + 의 수정 수준을 지정하는 바이트 값입니다. + + + 상속 플래그는 ACE(액세스 제어 항목)에 대한 상속 의미를 지정합니다. + + + ACE는 자식 컨테이너 개체에서 상속됩니다. + + + ACE는 자식 개체에서 상속되지 않습니다. + + + ACE는 자식 리프 개체에서 상속됩니다. + + + Microsoft Corporation에서 현재 정의한 모든 ACE(액세스 제어 항목) 형식을 캡슐화합니다.모든 개체는 32비트 액세스 마스크와 개체를 포함합니다. + + + 개체의 액세스 마스크를 가져오거나 설정합니다. + 개체의 액세스 마스크입니다. + + + 개체와 관련된 개체를 가져오거나 설정합니다. + 개체와 관련된 개체입니다. + + + ACL(액세스 제어 목록)을 직접 조작하지 않고 네이티브 개체에 대한 액세스를 제어하는 기능을 제공합니다.네이티브 개체 형식은 열거형에 의해 정의됩니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + 개체에 포함할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + 개체에 포함할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 사용자 지정 예외를 제공하며 통합자가 구현하는 대리자입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + 사용자 지정 예외를 제공하며 통합자가 구현하는 대리자입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 개체에 포함할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 컨테이너 개체이면 true입니다. + 개체가 연결되어 있는 보안 가능한 개체의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 개체에 포함할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 사용자 지정 예외를 제공하며 통합자가 구현하는 대리자입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 개체가 연결되어 있는 보안 가능한 개체가 디렉터리 또는 파일이며 해당 디렉터리나 파일을 찾을 수 없는 경우 + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + 개체가 연결되어 있는 보안 가능한 개체가 디렉터리 또는 파일이며 해당 디렉터리나 파일을 찾을 수 없는 경우 + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 개체가 연결되어 있는 보안 가능한 개체가 디렉터리 또는 파일이며 해당 디렉터리나 파일을 찾을 수 없는 경우 + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하십시오. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + 개체가 연결되어 있는 보안 가능한 개체가 디렉터리 또는 파일이며 해당 디렉터리나 파일을 찾을 수 없는 경우 + + + 통합자가 숫자 오류 코드를 직접 만든 특정 예외에 매핑하는 방법을 제공합니다. + 이 대리자가 만드는 입니다. + 숫자 오류 코드입니다. + + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + + 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + 사용자의 ID, 액세스 마스크 및 액세스 제어 형식(허용 또는 거부)의 조합을 나타냅니다.또한 개체에는 규칙을 적용할 개체의 형식, 규칙을 상속할 수 있는 자식 개체의 형식, 자식 개체에서 규칙을 상속하는 방법 및 상속을 전파하는 방법에 대한 정보가 들어 있습니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. 이 값은 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 액세스 규칙의 상속 속성을 지정합니다. + 상속된 액세스 규칙을 자동으로 전파할 것인지 여부를 지정합니다.으로 설정되면 전파 플래그는 무시됩니다. + 규칙을 적용할 개체의 형식입니다. + 규칙을 상속할 수 있는 자식 개체의 형식입니다. + 이 규칙의 액세스 허용 또는 거부 여부를 지정합니다. + + 매개 변수 값이 로 캐스팅될 수 없거나 매개 변수에 잘못된 값이 포함된 경우 + + 매개 변수 값이 0이거나 또는 매개 변수에 인식할 수 없는 플래그 값이 포함되어 있는 경우 + + + + 개체를 상속할 수 있는 자식 개체의 형식을 가져옵니다. + + 개체를 상속할 수 있는 자식 개체의 형식입니다. + + + + 개체의 속성에 올바른 값이 포함되어 있는지 여부를 지정하는 플래그를 가져옵니다. + + 속성에 올바른 값이 포함되어 있음을 지정하며, 속성에 올바른 값이 포함되어 있음을 지정합니다.이러한 값은 논리 OR와 함께 사용할 수 있습니다. + + + + 을 적용할 개체의 형식을 가져옵니다. + + 을 적용할 개체의 형식입니다. + + + 디렉터리 서비스 개체에 대한 액세스를 제어합니다.이 클래스는 디렉터리 개체와 관련된 ACE(액세스 제어 항목)를 나타냅니다. + + + + 클래스의 새 인스턴스를 시작합니다. + 새 ACE(액세스 제어 항목)의 상속, 상속 전파 및 감사 조건입니다. + 새 ACE의 사용 방법입니다. + ACE의 액세스 마스크입니다. + 새 ACE와 관련된 입니다. + + 매개 변수에 올바른 개체 GUID가 포함되어 있는지 여부를 나타냅니다. + 새 ACE를 적용할 개체 형식을 식별하는 GUID입니다. + 새 ACE를 상속할 수 있는 개체 형식을 식별하는 GUID입니다. + 새 ACE가 콜백 형식 ACE인 경우 true입니다. + 새 ACE와 관련된 불투명 데이터입니다.이 데이터는 콜백 ACE 형식에만 허용됩니다.이 배열의 길이는 메서드의 반환 값보다 크지 않아야 합니다. + 한정자 매개 변수에 잘못된 값이 포함되어 있거나 불투명 매개 변수 값의 길이가 메서드의 반환 값보다 큰 경우 + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + 개체가 나타내는 ACE(액세스 제어 항목)를 상속할 수 있는 개체 형식의 GUID를 가져오거나 설정합니다. + 개체가 나타내는 ACE(액세스 제어 항목)를 상속할 수 있는 개체 형식의 GUID입니다. + + + 콜백 ACE(액세스 제어 항목)에 대해 불투명 데이터 BLOB의 최대 허용 길이(바이트)를 반환합니다. + 콜백 ACE(액세스 제어 항목)에 대해 불투명 데이터 BLOB의 최대 허용 길이(바이트)입니다. + + 가 콜백 ACE 형식인 경우 true입니다. + + + + 속성에 올바른 개체 형식을 식별하는 값이 들어 있는지 여부를 지정하는 플래그를 가져오거나 설정합니다. + 논리 OR 연산으로 조합된 하나 이상의 열거형 멤버입니다. + + + 개체와 관련된 개체 형식의 GUID를 가져오거나 설정합니다. + 개체와 관련된 개체 형식의 GUID입니다. + + + ACE(액세스 제어 항목)에 대한 개체 형식의 존재 여부를 지정합니다. + + + ACE를 상속할 수 있는 개체의 형식입니다. + + + 어떠한 개체 형식도 없습니다. + + + ACE와 관련된 개체의 형식이 있습니다. + + + 사용자의 ID, 액세스 마스크 및 감사 조건의 조합을 나타냅니다.또한 개체에는 규칙을 적용할 개체의 형식, 규칙을 상속할 수 있는 자식 개체의 형식, 자식 개체에서 규칙이 상속되는 방법 그리고 상속을 전파하는 방법에 대한 정보가 들어 있습니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 액세스 규칙이 적용되는 ID입니다. 이 값은 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 액세스 규칙의 상속 속성을 지정합니다. + 상속된 액세스 규칙이 자동으로 전파되는지 여부입니다.으로 설정되면 전파 플래그는 무시됩니다. + 규칙을 적용할 개체의 형식입니다. + 규칙을 상속할 수 있는 자식 개체의 형식입니다. + 감사 조건입니다. + + 매개 변수 값이 로 캐스팅될 수 없거나 매개 변수에 잘못된 값이 포함된 경우 + + 매개 변수 값이 0이거나 또는 매개 변수에 인식할 수 없는 플래그 값이 포함되어 있는 경우 + + + + 개체를 상속할 수 있는 자식 개체의 형식을 가져옵니다. + + 개체를 상속할 수 있는 자식 개체의 형식입니다. + + + + 개체의 속성에 올바른 값이 들어 있습니다. + + 속성에 올바른 값이 포함되어 있음을 지정합니다. 속성에 올바른 값이 포함되어 있음을 지정합니다.이러한 값은 논리 OR와 함께 사용할 수 있습니다. + + + + 을 적용할 개체의 형식을 가져옵니다. + + 을 적용할 개체의 형식입니다. + + + ACL(액세스 제어 목록)을 직접 조작하지 않고 개체에 대한 액세스를 제어하는 기능을 제공합니다.이 클래스는 클래스의 추상 기본 클래스입니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 개체가 디렉터리 개체이면 true입니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + 인스턴스의 입니다. + + + Gets the of the securable object associated with this object. + 개체와 관련된 보안 가능한 개체의 형식입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 이 메서드가 만드는 개체를 반환합니다. + 액세스 규칙이 적용되는 ID입니다.이 값은 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 액세스 규칙의 상속 속성을 지정합니다. + 상속된 액세스 규칙을 자동으로 전파할 것인지 여부를 지정합니다.으로 설정되면 전파 플래그는 무시됩니다. + 올바른 액세스 제어 형식을 지정합니다. + + + 개체와 관련된 액세스 규칙이 수정되었는지 여부를 지정하는 부울 값을 가져오거나 설정합니다. + 개체와 관련된 액세스 규칙이 수정되었으면 true이고, 그렇지 않으면 false입니다. + + + Gets the of the object associated with the access rules of this object. 개체는 개체로 캐스팅할 수 있는 개체여야 합니다. + 개체의 액세스 규칙과 관련된 개체의 형식입니다. + + + 개체와 관련된 액세스 규칙이 정식 순서대로 되어 있는지 여부를 지정하는 부울 값을 가져옵니다. + 액세스 규칙이 정식 순서대로 되어 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 DACL(임의 액세스 제어 목록)이 보호되는지 여부를 지정하는 부울 값을 가져옵니다. + DACL이 보호되면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 감사 규칙이 정식 순서대로 되어 있는지 여부를 지정하는 부울 값을 가져옵니다. + 감사 규칙이 정식 순서대로 되어 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 SACL(시스템 액세스 제어 목록)이 보호되는지 여부를 지정하는 부울 값을 가져옵니다. + SACL이 보호되면 true이고, 그렇지 않으면 false입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 이 메서드가 만드는 개체를 반환합니다. + 감사 규칙이 적용되는 ID입니다.이 값은 로 캐스팅할 수 있는 개체여야 합니다. + 이 규칙의 액세스 마스크입니다.액세스 마스크는 익명 비트의 32비트 컬렉션으로, 비트의 의미는 개별 통합자가 정의합니다. + 이 규칙이 부모 컨테이너에서 상속되면 true입니다. + 감사 규칙의 상속 속성을 지정합니다. + 상속된 감사 규칙을 자동으로 전파할 것인지 여부를 지정합니다.으로 설정되면 전파 플래그는 무시됩니다. + 규칙의 감사 조건을 지정합니다. + + + 개체와 관련된 감사 규칙이 수정되었는지 여부를 지정하는 부울 값을 가져오거나 설정합니다. + 개체와 관련된 감사 규칙이 수정되었으면 true이고, 그렇지 않으면 false입니다. + + + Gets the object associated with the audit rules of this object. 개체는 개체로 캐스팅할 수 있는 개체여야 합니다. + 개체의 감사 규칙과 관련된 개체의 형식입니다. + + + 지정된 소유자와 관련된 주 그룹을 가져옵니다. + 지정된 소유자와 관련된 주 그룹입니다. + 주 그룹을 가져올 소유자입니다. + + + + + + 지정된 주 그룹과 관련된 소유자를 가져옵니다. + 지정된 그룹과 관련된 소유자입니다. + 소유자를 가져올 주 그룹입니다. + + + + + + 개체의 보안 설명자 정보를 나타내는 바이트 값 배열을 반환합니다. + 개체의 보안 설명자를 나타내는 바이트 값 배열입니다.이 개체에 보안 정보가 없는 경우 이 메서드는 null을 반환합니다. + + + 개체와 관련된 지정된 보안 설명자 섹션의 SDDL(Security Descriptor Definition Language) 표현을 반환합니다. + 개체와 관련된 지정된 보안 설명자 섹션의 SDDL 표현입니다. + 가져올 보안 설명자 섹션(액세스 규칙, 감사 규칙, 주 그룹 및 소유자)을 지정합니다. + + + 보안 가능한 개체와 관련된 그룹이 수정되었는지 여부를 지정하는 부울 값을 가져오거나 설정합니다. + 보안 가능한 개체와 관련된 그룹이 수정되었으면 true이고, 그렇지 않으면 false입니다. + + + 개체가 컨테이너 개체인지 여부를 지정하는 부울 값을 가져옵니다. + + 개체가 컨테이너 개체이면 true이고, 그렇지 않으면 false입니다. + + + 개체가 디렉터리 개체인지 여부를 지정하는 부울 값을 가져옵니다. + + 가 디렉터리 개체이면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 보안 설명자를 SDDL(Security Descriptor Definition Language) 형식으로 변환할 수 있는지 여부를 지정하는 부울 값을 반환합니다. + 개체와 관련된 보안 설명자를 SDDL(Security Descriptor Definition Language) 형식으로 변환할 수 있으면 true이고, 그렇지 않으면 false입니다. + + + 지정된 수정 사항을 이 개체와 관련된 DACL(임의 액세스 제어 목록)에 적용합니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + DACL에 적용할 수정 내용입니다. + 수정할 액세스 규칙입니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 지정된 수정 사항을 이 개체와 관련된 DACL(임의 액세스 제어 목록)에 적용합니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + DACL에 적용할 수정 내용입니다. + 수정할 액세스 규칙입니다. + DACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 지정된 수정 사항을 이 개체와 관련된 SACL(시스템 액세스 제어 목록)에 적용합니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + SACL에 적용할 수정 내용입니다. + 수정할 감사 규칙입니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 지정된 수정 사항을 이 개체와 관련된 SACL(시스템 액세스 제어 목록)에 적용합니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + SACL에 적용할 수정 내용입니다. + 수정할 감사 규칙입니다. + SACL이 성공적으로 수정되면 true이고, 그렇지 않으면 false입니다. + + + 보안 가능한 개체의 소유자가 수정되었는지 여부를 지정하는 부울 값을 가져오거나 설정합니다. + 보안 가능한 개체의 소유자가 수정되었으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하세요. + 호출자가 개체의 소유권을 가질 수 있도록 하는 권한을 설정하려면 true입니다. + 유지된 정보를 검색하는 데 사용하는 이름입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하세요. + 유지된 정보를 검색하는 데 사용하는 핸들입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + + + 개체와 연결된 보안 설명자의 지정된 섹션을 영구 저장소에 저장합니다.생성자와 persist 메서드에는 동일한 매개 변수 값을 전달하는 것이 좋습니다.자세한 내용은 설명 부분을 참조하세요. + 유지된 정보를 검색하는 데 사용하는 이름입니다. + 저장할 보안 가능한 개체의 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 기본 그룹)을 지정하는 열거형 값 중 하나입니다. + + + 지정된 와 관련된 모든 액세스 규칙을 제거합니다. + 모든 액세스 규칙을 제거할 입니다. + 모든 액세스 규칙이 정식 순서대로 되어 있지 않은 경우 + + + 지정된 와 관련된 모든 감사 규칙을 제거합니다. + 모든 감사 규칙을 제거할 입니다. + 모든 감사 규칙이 정식 순서대로 되어 있지 않은 경우 + + + 개체에 대한 읽기 액세스를 잠급니다. + + + 개체에 대한 읽기 액세스의 잠금을 해제합니다. + + + 개체와 관련된 액세스 규칙의 보호를 설정하거나 제거합니다.보호된 액세스 규칙은 부모 개체에서 상속을 통해 수정할 수 없습니다. + 개체와 관련된 액세스 규칙을 상속으로부터 보호하려면 true이고, 상속을 허용하려면 false입니다. + 상속된 액세스 규칙을 유지하려면 true이고, 상속된 액세스 규칙을 제거하려면 false입니다.가 false이면 이 매개 변수는 무시됩니다. + 이 메서드는 정식이 아닌 DACL(임의 액세스 제어 목록)에서 상속된 규칙을 제거하려고 시도하는 경우 + + + 개체와 관련된 감사 규칙의 보호를 설정하거나 제거합니다.보호된 감사 규칙은 부모 개체에서 상속을 통해 수정할 수 없습니다. + 개체와 관련된 감사 규칙을 상속으로부터 보호하려면 true이고, 상속을 허용하려면 false입니다. + 상속된 감사 규칙을 유지하려면 true이고, 상속된 감사 규칙을 제거하려면 false입니다.가 false이면 이 매개 변수는 무시됩니다. + 이 메서드는 정식이 아닌 SACL(시스템 액세스 제어 목록)에서 상속된 규칙을 제거하려고 시도하는 경우 + + + 개체와 관련된 보안 설명자의 주 그룹을 설정합니다. + 설정할 주 그룹입니다. + + + 개체와 관련된 보안 설명자의 소유자를 설정합니다. + 설정할 소유자입니다. + + + 지정한 바이트 값 배열에서 이 개체의 보안 설명자를 설정합니다. + 보안 설명자를 설정할 바이트 배열입니다. + + + 지정한 바이트 값 배열에서 이 개체에 대해 지정한 보안 설명자 섹션을 설정합니다. + 보안 설명자를 설정할 바이트 배열입니다. + 설정할 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 주 그룹)입니다. + + + 지정한 SDDL(Security Descriptor Definition Language) 문자열에서 이 개체의 보안 설명자를 설정합니다. + 보안 설명자를 설정할 SDDL 문자열입니다. + + + 지정한 SDDL(Security Descriptor Definition Language) 문자열에서 이 개체에 대해 지정한 보안 설명자 섹션을 설정합니다. + 보안 설명자를 설정할 SDDL 문자열입니다. + 설정할 보안 설명자 섹션(액세스 규칙, 감사 규칙, 소유자 및 주 그룹)입니다. + + + 개체에 대한 쓰기 액세스를 잠급니다. + + + 개체에 대한 쓰기 액세스의 잠금을 해제합니다. + + + ACL(액세스 제어 목록)을 직접 조작하지 않고 개체에 대한 액세스를 제어할 수 있는 기능을 제공하며, 액세스 권한을 형식 캐스팅할 수 있는 기능도 부여합니다. + 개체에 대한 액세스 권한입니다. + + + ObjectSecurity’1 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 리소스의 형식입니다. + + + ObjectSecurity’1 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 리소스의 형식입니다. + 핸들입니다. + 포함할 섹션입니다. + + + ObjectSecurity’1 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 리소스의 형식입니다. + 핸들입니다. + 포함할 섹션입니다. + 사용자 지정 예외를 제공하며 통합자가 구현하는 대리자입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + ObjectSecurity’1 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 리소스의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 포함할 섹션입니다. + + + ObjectSecurity’1 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너 개체이면 true입니다. + 리소스의 형식입니다. + 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + 포함할 섹션입니다. + 사용자 지정 예외를 제공하며 통합자가 구현하는 대리자입니다. + 예외의 소스 또는 대상에 대한 컨텍스트 정보를 포함하는 개체입니다. + + + 이 ObjectSecurity’1 개체와 관련된 보안 가능한 개체의 형식을 가져옵니다. + 현재 인스턴스와 관련된 보안 가능한 개체의 형식입니다. + + + 관련된 보안 개체에 대한 새로운 액세스 제어 규칙을 나타내는 ObjectAccessRule 클래스의 새 인스턴스를 초기화합니다. + 지정된 액세스 권한, 액세스 제어 및 플래그로 지정한 사용자의 새 액세스 제어 규칙을 나타냅니다. + 사용자 계정을 나타냅니다. + 액세스 형식입니다. + 액세스 규칙이 상속된 것이면 true이고, 그렇지 않으면 false입니다. + 액세스 마스크를 자식 개체로 전파할 방법을 지정합니다. + ACE(액세스 제어 항목)가 자식 개체로 전파되는 방법을 지정합니다. + 액세스가 허용 또는 거부되는지를 지정합니다. + + + 이 ObjectSecurity’1 개체의 액세스 규칙과 관련된 개체의 형식을 가져옵니다. + 현재 인스턴스의 액세스 규칙과 관련된 개체의 형식입니다. + + + 지정한 액세스 규칙을 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에 추가합니다. + 추가할 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 SACL(시스템 액세스 제어 목록)에 지정된 감사 규칙을 추가합니다. + 추가할 감사 규칙입니다. + + + 지정된 사용자에 대한 지정된 감사 규칙을 나타내는 클래스의 새 인스턴스를 초기화합니다. + 지정된 사용자에 대한 지정된 감사 규칙을 반환합니다. + 사용자 계정을 나타냅니다. + 액세스 형식을 지정하는 정수입니다. + 액세스 규칙이 상속된 것이면 true이고, 그렇지 않으면 false입니다. + 액세스 마스크를 자식 개체로 전파할 방법을 지정합니다. + ACE(액세스 제어 항목)가 자식 개체로 전파되는 방법을 지정합니다. + 수행할 감사 형식을 설명합니다. + + + 이 ObjectSecurity’1 개체의 감사 규칙과 관련된 개체의 형식을 가져옵니다. + 현재 인스턴스의 감사 규칙과 관련된 형식 개체입니다. + + + 지정된 핸들을 사용하여 이 ObjectSecurity`1 개체와 연결된 보안 설명자를 영구 저장소에 저장합니다. + 이 ObjectSecurity`1 개체가 연결되어 있는 보안 가능한 개체의 핸들입니다. + + + 지정된 이름을 사용하여 이 ObjectSecurity`1 개체와 연결된 보안 설명자를 영구 저장소에 저장합니다. + 이 ObjectSecurity`1 개체가 연결되어 있는 보안 가능한 개체의 이름입니다. + + + 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자 및 액세스 마스크가 들어 있는 액세스 규칙을 제거합니다. + 액세스 규칙이 성공적으로 제거되었으면 true, 그렇지 않으면 false를 반환합니다. + 제거할 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자가 있는 모든 액세스 규칙을 제거합니다. + 제거할 액세스 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 정확히 일치하는 모든 액세스 규칙을 제거합니다. + 제거할 액세스 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자 및 액세스 마스크를 포함하는 액세스 규칙을 제거합니다. + 개체가 제거되었으면 true, 그렇지 않으면 false를 반환합니다. + 제거할 감사 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자를 갖는 모든 감사 규칙을 제거합니다. + 제거할 감사 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 정확히 일치하는 모든 감사 규칙을 제거합니다. + 제거할 감사 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에서 모든 액세스 규칙을 제거한 다음 지정된 액세스 규칙을 추가합니다. + 재설정할 액세스 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 DACL(임의 액세스 제어 목록)에서 지정한 액세스 규칙과 동일한 보안 식별자 및 한정자가 들어 있는 모든 액세스 규칙을 제거한 다음 지정한 액세스 규칙을 추가합니다. + 설정할 액세스 규칙입니다. + + + 이 ObjectSecurity`1 개체와 관련된 SACL(시스템 액세스 제어 목록)에서 지정된 감사 규칙과 동일한 보안 식별자 및 한정자를 포함하는 모든 감사 규칙을 제거한 후 지정한 감사 규칙을 추가합니다. + 설정할 감사 규칙입니다. + + + + 네임스페이스의 메서드가 부여되지 않은 권한을 활성화하려고 할 때 throw되는 예외입니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + 지정된 권한을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 활성화되지 않은 권한입니다. + + + 지정된 예외를 사용하여 클래스의 새 인스턴스를 초기화합니다. + 활성화되지 않은 권한입니다. + 현재 예외의 원인이 되는 예외입니다. 매개 변수가 null 참조(Visual Basic에서는 Nothing)가 아니면, 현재 예외는 내부 예외를 처리하는 catch 블록에서 발생합니다. + + + 활성화되지 않은 권한의 이름을 가져옵니다. + 메서드가 활성화하지 못한 권한의 이름입니다. + + + ACE(액세스 제어 항목)가 자식 개체로 전파되는 방법을 지정합니다. 이 플래그는 상속 플래그가 있는 경우에만 의미를 가집니다. + + + ACE가 자식 개체로만 전파되도록 지정합니다.여기에는 컨테이너와 리프 자식 개체도 모두 포함됩니다. + + + 상속 플래그가 설정되지 않도록 지정합니다. + + + ACE가 자식 개체로 전파되지 않도록 지정합니다. + + + 한정자가 포함된 ACE(액세스 제어 항목)를 나타냅니다. 개체로 표시되는 한정자는 ACE의 액세스 허용, 액세스 거부, 시스템 감사 수행 또는 시스템 경보 발생 여부를 지정합니다. 클래스는 클래스의 추상 기본 클래스입니다. + + + ACE의 액세스 허용, 액세스 거부, 시스템 감사 수행 또는 시스템 경보 발생 여부를 지정하는 값을 가져옵니다. + ACE의 액세스 허용, 액세스 거부, 시스템 감사 수행 또는 시스템 경보 발생 여부를 지정하는 값입니다. + + + 개체와 관련된 불투명 콜백 데이터를 반환합니다. + 개체와 관련된 불투명 콜백 데이터를 나타내는 바이트 값의 배열입니다. + + + 개체에 콜백 데이터가 들어 있는지 여부를 지정합니다. + 개체에 콜백 데이터가 들어 있으면 true이고, 그렇지 않으면 false입니다. + + + 개체와 관련된 불투명 콜백 데이터의 길이를 가져옵니다.이 속성은 콜백 ACE(액세스 제어 항목)에 대해서만 유효합니다. + 불투명 콜백 데이터의 길이입니다. + + + 개체와 관련된 불투명 콜백 데이터를 설정합니다. + 개체의 불투명 콜백 데이터를 나타내는 바이트 값의 배열입니다. + + + ACL(액세스 제어 목록)을 나타냅니다. + + + 지정된 수정 수준을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 새 ACL(액세스 제어 목록)의 수정 수준입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 지정된 이진 형식에서 클래스의 새 인스턴스를 초기화합니다. + ACL(액세스 제어 목록)을 나타내는 바이트 값 배열입니다. + 데이터 역마샬링을 시작할 매개 변수의 오프셋입니다. + + + 현재 개체에 대한 이진 표현의 길이(바이트)를 가져옵니다.이 길이는 메서드를 사용하여 ACL을 이진 배열로 마샬링하기 전에 사용해야 합니다. + 현재 개체의 이진 표현 길이(바이트)입니다. + + + 현재 개체에 있는 ACE(액세스 제어 항목) 수를 가져옵니다. + 현재 개체에 있는 ACE의 수입니다. + + + + 개체의 내용을 특정 오프셋 위치에서 시작하여 지정된 바이트 배열에 마샬링합니다. + + 의 내용이 마샬링되는 바이트 배열입니다. + 마샬링을 시작할 오프셋입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + 지정한 인덱스에 지정한 ACE(액세스 제어 항목)를 삽입합니다. + 새 ACE를 추가할 위치입니다. 속성 값을 지정하여 개체의 끝에 ACE를 삽입합니다. + 삽입할 ACE입니다. + + 값이 음수이거나, 너무 커서 전체 에 복사할 수 없는 경우 + + + 지정한 인덱스의 ACE(액세스 제어 항목)를 가져오거나 설정합니다. + 지정된 인덱스의 ACE입니다. + 가져오거나 설정할 ACE의 인덱스(0부터 시작)입니다. + + + 지정한 위치의 ACE(액세스 제어 항목)를 제거합니다. + 제거할 의 ACE의 인덱스(0부터 시작)입니다. + + 매개 변수 값이 속성 값에서 1을 뺀 값보다 크거나 음수인 경우 + + + + 의 수정 수준을 가져옵니다. + + 의 수정 수준을 지정하는 바이트 값입니다. + + + 보안 설명자를 나타냅니다.보안 설명자에는 소유자, 주 그룹, DACL(임의 액세스 제어 목록) 및 SACL(시스템 액세스 제어 목록)이 포함됩니다. + + + 지정된 바이트 값 배열을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체를 만들 바이트 값 배열입니다. + + 배열에서 복사를 시작할 오프셋입니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체의 동작을 지정하는 플래그입니다. + 개체의 소유자입니다. + 개체의 기본 그룹입니다. + 개체의 SACL(시스템 액세스 제어 목록)입니다. + 개체의 DACL(임의 액세스 제어 목록)입니다. + + + 지정한 SDDL(Security Descriptor Definition Language) 문자열에서 클래스의 새 인스턴스를 초기화합니다. + 개체를 만들 SDDL 문자열입니다. + + + + 개체의 동작을 지정하는 값을 가져옵니다. + 논리 OR 연산으로 조합된 열거형의 하나 이상의 값입니다. + + + 개체의 DACL(임의 액세스 제어 목록)을 가져오거나 설정합니다.DACL에는 액세스 규칙이 포함되어 있습니다. + 개체의 DACL입니다. + + + 개체의 기본 그룹을 가져오거나 설정합니다. + 개체의 기본 그룹입니다. + + + 개체와 관련된 개체의 소유자를 가져오거나 설정합니다. + 개체와 관련된 개체의 소유자입니다. + + + 개체와 관련된 리소스 관리자 제어 비트를 나타내는 바이트 값을 가져오거나 설정합니다. + 개체와 관련된 리소스 관리자 제어 비트를 나타내는 바이트 값입니다. + + + 개체의 속성을 지정된 값으로 설정합니다. + 논리 OR 연산으로 조합된 열거형의 하나 이상의 값입니다. + + + 개체의 SACL(시스템 액세스 제어 목록)을 가져오거나 설정합니다.SACL에는 감사 규칙이 포함되어 있습니다. + 개체의 SACL입니다. + + + 정의된 네이티브 개체 형식을 지정합니다. + + + DS(디렉터리 서비스) 개체이거나 디렉터리 서비스 개체의 속성 집합 또는 속성입니다. + + + 디렉터리 서비스 개체와 개체의 모든 속성 집합 및 속성입니다. + + + 파일 또는 디렉터리입니다. + + + 로컬 커널 개체입니다. + + + 네트워크 공유입니다. + + + 프린터입니다. + + + 공급자가 정의한 개체입니다. + + + 레지스트리 키입니다. + + + WOW64에 속해 있는 레지스트리 항목의 개체입니다. + + + Windows 서비스입니다. + + + 알 수 없는 개체 형식입니다. + + + 로컬 컴퓨터의 윈도우 스테이션 또는 바탕 화면 개체입니다. + + + WMI(Windows Management Instrumentation) 개체입니다. + + + 쿼리하거나 설정할 보안 설명자의 섹션을 지정합니다. + + + DACL(임의 액세스 제어 목록)을 지정합니다. + + + 기본 그룹 식별자를 지정합니다. + + + 소유자 식별자를 지정합니다. + + + SACL(시스템 액세스 제어 목록)을 지정합니다. + + + SACL(시스템 액세스 제어 목록)을 나타냅니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너이면 true입니다. + 개체가 디렉터리 개체 ACL(액세스 제어 목록)이면 true입니다. + 개체의 수정 수준입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너이면 true입니다. + 개체가 디렉터리 개체 ACL(액세스 제어 목록)이면 true입니다. + 개체에 포함될 수 있는 ACE(액세스 제어 항목)의 수입니다.이 번호는 힌트로만 사용됩니다. + + + 지정된 개체의 지정된 값을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 개체가 컨테이너이면 true입니다. + 개체가 디렉터리 개체 ACL(액세스 제어 목록)이면 true입니다. + 개체의 내부 개체입니다.null을 지정하여 빈 ACL을 만듭니다. + + + 현재 개체에 감사 규칙을 추가합니다. + 추가할 감사 규칙의 형식입니다. + 감사 규칙을 추가할 입니다. + 새 감사 규칙의 액세스 마스크입니다. + 새 감사 규칙의 상속 속성을 지정하는 플래그입니다. + 새 감사 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + + 현재 개체에 지정된 설정이 있는 감사 규칙을 추가합니다.이 메서드는 새 감사 규칙의 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 추가할 감사 규칙의 형식입니다. + 감사 규칙을 추가할 입니다. + 새 감사 규칙의 액세스 마스크입니다. + 새 감사 규칙의 상속 속성을 지정하는 플래그입니다. + 새 감사 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 새 감사 규칙을 적용할 개체 클래스의 ID입니다. + 새 감사 규칙을 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 현재 개체에 감사 규칙을 추가합니다. + 감사 규칙을 추가할 입니다. + + 새 감사 규칙에 대 한 합니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다. + 지정한 감사 규칙이 이 메서드로 제거되면 true이고, 그렇지 않으면 false입니다. + 제거할 감사 규칙의 형식입니다. + 감사 규칙을 제거할 입니다. + 제거할 규칙에 대한 액세스 마스크입니다. + 제거할 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다.이 메서드는 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 지정한 감사 규칙이 이 메서드로 제거되면 true이고, 그렇지 않으면 false입니다. + 제거할 감사 규칙의 형식입니다. + 감사 규칙을 제거할 입니다. + 제거할 규칙에 대한 액세스 마스크입니다. + 제거할 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 제거한 감사 제어 규칙을 적용할 개체 클래스의 ID입니다. + 제거한 감사 규칙을 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다. + 지정한 감사 규칙이 이 메서드로 제거되면 true이고, 그렇지 않으면 false입니다. + 감사 규칙을 제거할 입니다. + 감사 규칙을 제거할 입니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다. + 제거할 감사 규칙의 형식입니다. + 감사 규칙을 제거할 입니다. + 제거할 규칙에 대한 액세스 마스크입니다. + 제거할 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다.이 메서드는 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 제거할 감사 규칙의 형식입니다. + 감사 규칙을 제거할 입니다. + 제거할 규칙에 대한 액세스 마스크입니다. + 제거할 규칙의 상속 속성을 지정하는 플래그입니다. + 제거할 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 제거한 감사 제어 규칙을 적용할 개체 클래스의 ID입니다. + 제거한 감사 규칙을 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정한 감사 규칙을 현재 개체에서 제거합니다. + 감사 규칙을 제거할 입니다. + + 제거할 규칙에 대 한 합니다. + + + 지정한 감사 규칙을 지정한 개체에 설정합니다. + 설정할 감사 조건입니다. + 감사 규칙을 설정할 입니다. + 새 감사 규칙의 액세스 마스크입니다. + 새 감사 규칙의 상속 속성을 지정하는 플래그입니다. + 새 감사 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + + 지정한 감사 규칙을 지정한 개체에 설정합니다.이 메서드는 개체 형식 또는 상속된 개체 형식을 지정할 때 디렉터리 개체 ACL(액세스 제어 목록)에 사용합니다. + 설정할 감사 조건입니다. + 감사 규칙을 설정할 입니다. + 새 감사 규칙의 액세스 마스크입니다. + 새 감사 규칙의 상속 속성을 지정하는 플래그입니다. + 새 감사 규칙의 상속 전파 속성을 지정하는 플래그입니다. + + 매개 변수에 null이 아닌 값이 포함되어 있는지 여부를 지정하는 플래그입니다. + 새 감사 규칙을 적용할 개체 클래스의 ID입니다. + 새 감사 규칙을 상속할 수 있는 자식 개체 클래스의 ID입니다. + + + 지정한 감사 규칙을 지정한 개체에 설정합니다. + 감사 규칙을 설정할 입니다. + 감사 규칙을 설정할 입니다. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ru/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ru/System.Security.AccessControl.xml new file mode 100644 index 0000000..fb247ae --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/ru/System.Security.AccessControl.xml @@ -0,0 +1,1939 @@ + + + + System.Security.AccessControl + + + + Определяет действия, разрешенные для защищаемых объектов. + + + Разрешен доступ только для записи. + + + Доступ запрещен. + + + Разрешен доступ только для чтения. + + + Определяет тип выполняемого изменения управления доступом.Это перечисление используется методами класса и производных классов. + + + Добавить указанное правило авторизации к списку управления доступом. + + + Удалить правила авторизации, содержащие ИД безопасности и маску доступа, как у указанного правила авторизации, из списка управления доступом. + + + Удалить правила авторизации, содержащие ИД безопасности, как у указанного правила авторизации, из списка управления доступом. + + + Удалить правила авторизации, в точности совпадающие с указанным правилом авторизации, из списка управления доступом. + + + Удалить правила авторизации, содержащие ИД безопасности, как у указанного правила авторизации, из списка управления доступом, после чего добавить в список управления доступом указанное правило авторизации. + + + Удалить все правила авторизации из списка управления доступом, после чего добавить в список управления доступом указанное правило авторизации. + + + Определяет разделы дескриптора безопасности для сохранения и загрузки. + + + Список управления доступом на уровне пользователей. + + + Весь дескриптор безопасности. + + + Системный список управления доступом. + + + Основная группа. + + + Ни один из разделов. + + + Владелец. + + + Определяет тип правила — разрешающее или запрещающее доступ.Эти значения не являются флагами и их невозможно объединять. + + + Объект , который используется для разрешения доступа к защищаемому объекту. + + + Объект , который используется для запрета доступа к защищаемому объекту. + + + Представляет сочетание идентификатора пользователя, маски доступа и типа управления доступом ("разрешить" или "запретить").Кроме того, в объекте содержатся сведения о том, как правило наследуется дочерними объектами и как это наследование распространяется. + + + Инициализирует новый экземпляр , используя указанные значения. + Идентификатор, к которому применяется правило доступа.В качестве этого параметра должен выступать объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Допустимый тип управления доступом. + Значение параметра нельзя привести к типу или параметр содержит недопустимое значение. + Значение параметра равно нулю или параметр или содержит неизвестное значение. + + + Получает значение , связанное с данным объектом . + Значение , связанное с данным объектом . + + + Представляет сочетание идентификатора пользователя, маски доступа и типа управления доступом ("разрешить" или "запретить").Кроме того, в объекте AccessRule`1 содержатся сведения о том, как правило наследуется дочерними объектами и как это наследование распространяется. + Тип прав доступа для правила доступа. + + + Инициализирует новый экземпляр класса AccessRule’1, используя указанные значения. + Идентификатор, к которому применяется правило доступа. + Права правила доступа. + Допустимый тип управления доступом. + + + Инициализирует новый экземпляр класса AccessRule’1, используя указанные значения. + Идентификатор, к которому применяется правило доступа. + Права правила доступа. + Свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Допустимый тип управления доступом. + + + Инициализирует новый экземпляр класса AccessRule’1, используя указанные значения. + Идентификатор, к которому применяется правило доступа. + Права правила доступа. + Допустимый тип управления доступом. + + + Инициализирует новый экземпляр класса AccessRule’1, используя указанные значения. + Идентификатор, к которому применяется правило доступа. + Права правила доступа. + Свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Допустимый тип управления доступом. + + + Возвращает права текущего экземпляра. + Права текущего экземпляра приведенные к типу <T>. + + + Обеспечивает возможность перебора элементов управления доступом в списке управления доступом. + + + Получает текущий элемент в коллекции .Это свойство получает версию объекта удобного типа. + Текущий элемент коллекции . + + + Перемещает перечислитель к следующему элементу коллекции . + Значение true, если перечислитель был успешно перемещен к следующему элементу; значение false, если перечислитель достиг конца коллекции. + Коллекция была изменена после создания перечислителя. + + + Устанавливает перечислитель в исходное положение перед первым элементом коллекции . + Коллекция была изменена после создания перечислителя. + + + + Определяет порядок наследования и аудита элемента управления доступом. + + + Все попытки доступа подлежат аудиту. + + + Маска доступа распространяется на дочерние объекты-контейнеры. + + + Неудачные попытки доступа подлежат аудиту. + + + Операция логического OR, примененная к флагам , , и . + + + Элемент управления доступом наследуется у родительского контейнера, а на задается для объекта явным образом. + + + Маска доступа распространяется только на дочерние объекты.К ним относятся контейнеры и конечные дочерние объекты. + + + Флаги элементов управления доступом не установлены. + + + Проверка прав доступа не применяется к данному объекту. Она применяется только к его дочерним объектам. + + + Маска доступа распространяется на дочерние конечные объекты. + + + Удачные попытки доступа подлежат аудиту. + + + Задает функцию элемента управления доступом. + + + Разрешить доступ. + + + Запретить доступ. + + + Вызвать системное оповещение. + + + Вызвать системный аудит. + + + Определяет доступные типы элементов управления доступом. + + + Разрешает доступ к объекту для конкретного доверенного лица, определяемого объектом . + + + Разрешает доступ к объекту для конкретного доверенного лица, определяемого объектом .Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Разрешает доступ к объекту, набору свойств или свойству.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта, а также объект , который определяет доверенное лицо, получающее доступ.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами.Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Определено, но никогда не используется.Указано для полноты представления информации. + + + Разрешает доступ к объекту, набору свойств или свойству.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта, а также объект , который определяет доверенное лицо, получающее доступ.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами. + + + Запрещает доступ к объекту для конкретного доверенного лица, определяемого объектом . + + + Запрещает доступ к объекту для конкретного доверенного лица, определяемого объектом .Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Запрещает доступ к объекту, набору свойств или свойству.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта, а также объект , который определяет доверенное лицо, получающее доступ.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами.Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Запрещает доступ к объекту, набору свойств или свойству.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта, а также объект , который определяет доверенное лицо, получающее доступ.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами. + + + Максимальный определенный тип элемента управления доступом в перечислении. + + + Зарезервировано для использования в будущем. + + + Зарезервировано для использования в будущем. + + + Зарезервировано для использования в будущем. + + + Зарезервировано для использования в будущем. + + + Вызывает регистрацию сообщения аудита, когда указанное доверенное лицо пытается получить доступ к объекту.Доверенное лицо определяется объектом . + + + Вызывает регистрацию сообщения аудита, когда указанное доверенное лицо пытается получить доступ к объекту.Доверенное лицо определяется объектом .Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Вызывает регистрацию сообщения аудита, когда указанное доверенное лицо пытается получить доступ к объекту или его составляющим, например к свойству или набору свойств.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта или его составляющих, а также объект , который определяет доверенное лицо, доступ которого подлежит аудиту.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами.Элемент управления доступом этого типа может содержать необязательные данные обратного вызова.Данные обратного вызова представляют собой определяемый диспетчером ресурсов и неинтерпретируемый большой двоичный объект. + + + Вызывает регистрацию сообщения аудита, когда указанное доверенное лицо пытается получить доступ к объекту или его составляющим, например к свойству или набору свойств.Такой элемент управления доступом содержит набор прав доступа, идентификатор GUID, определяющий тип объекта или его составляющих, а также объект , который определяет доверенное лицо, доступ которого подлежит аудиту.Кроме того, этот элемент содержит GUID и набор флагов, определяющих параметры наследования элемента управления доступом дочерними объектами. + + + Задает условия аудита попыток доступа к защищаемому объекту. + + + Аудиту подлежат неудачные попытки доступа. + + + Аудиту не подлежат никакие попытки доступа. + + + Аудиту подлежат успешные попытки доступа. + + + Представляет сочетание идентификатора пользователя и маски доступа.Кроме того, в объекте содержатся сведения о том, как правило наследуется дочерними объектами, как это наследование распространяется, а также об условиях, при которых выполняется аудит. + + + Инициализирует новый экземпляр , используя указанные значения. + Идентификатор, к которому применяется правило аудита.Это должен быть объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Свойства наследования правила аудита. + Определяет возможность автоматического распространения наследуемых правил аудита.Флаги распространения игнорируются, если параметр имеет значение . + Условия, при которых применяется правило аудита. + Значение параметра нельзя привести к типу или параметр содержит недопустимое значение. + Значение параметра равно нулю или параметр или содержит неизвестное значение. + + + Получает флаги аудита для данного правила аудита. + Побитовое сочетание значений перечисления.Это сочетание определяет условия аудита для данного правила аудита. + + + Представляет сочетание идентификатора пользователя и маски доступа. + + + + Инициализирует новый экземпляр класса AuditRule’1, используя указанные значения. + Удостоверение, к которому применяется данное правило аудита. + Права правила аудита. + Условия, при которых применяется правило аудита. + + + Инициализирует новый экземпляр класса AuditRule’1, используя указанные значения. + Идентификатор, к которому применяется правило аудита. + Права правила аудита. + Свойства наследования правила аудита. + Определяет возможность автоматического распространения наследуемых правил аудита. + Условия, при которых применяется правило аудита. + + + Инициализирует новый экземпляр класса AuditRule’1, используя указанные значения. + Идентификатор, к которому применяется правило аудита. + Права правила аудита. + Свойства правила аудита. + + + Инициализирует новый экземпляр класса AuditRule’1, используя указанные значения. + Идентификатор, к которому применяется правило аудита. + Права правила аудита. + Свойства наследования правила аудита. + Определяет возможность автоматического распространения наследуемых правил аудита. + Условия, при которых применяется правило аудита. + + + Права правила аудита. + Возвращает . + + + Определяет доступ к защищаемым объектам.В производных классах и детализируются функции доступа и аудита. + + + Инициализирует новый экземпляр , используя указанные значения. + Идентификатор, к которому применяется правило доступа. В качестве этого параметра должен выступать объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Значение параметра нельзя привести к типу . + Значение параметра равно нулю или параметр или содержит неизвестное значение. + + + Получает маску доступа для данного правила. + Маска доступа для данного правила. + + + Получает объект , к которому применяется данное правило. + Объект , к которому применяется данное правило. + + + Получает значение флагов, определяющих порядок наследования правила дочерними объектами. + Побитовое сочетание значений перечисления. + + + Получает значение, которое определяет, наследуется правило от родительского объекта-контейнера или задается явным образом. + Значение true, если правило наследуется от родительского контейнера, а не задается явным образом. + + + Получает значение флагов распространения, определяющих порядок распространения наследования правила среди дочерних объектов.Это свойство имеет смысл лишь в том случае, когда значение перечисления не равно . + Побитовое сочетание значений перечисления. + + + Представляет коллекцию объектов . + + + Инициализирует новый экземпляр класса . + + + Добавление в коллекцию объекта . + Объект для добавления в коллекцию. + + + Копирует содержимое коллекции в массив. + Массив, в который нужно скопировать содержимое коллекции. + Индекс (с нуля), с которого начинается копирование. + + + + Получает объект по указанному индексу в коллекции. + Объект по указанному индексу. + Отсчитываемый с нуля индекс получаемого объекта . + + + + + + + Представляет элемент управления доступом. + + + Инициализирует новый экземпляр класса . + Флаги, определяющие параметры наследования и распространения наследования, а также условия аудита нового элемента управления доступом. + Функция нового элемента управления доступом. + Маска доступа элемента управления доступом. + Объект , связанный с новым элементом управления доступом. + Значение true, если новый элемент управления доступом является элементом управления доступом обратного вызова. + Непрозрачные данные, связанные с новым элементом управления доступом.Непрозрачные данные разрешены только для элементов управления доступом обратного вызова.Длина этого массива не должна превышать значения, возвращаемого методом . + + + Получает длину в байтах двоичного представления текущего объекта .Это длину необходимо передать методу перед маршалингом списка управления доступом в двоичный массив. + Длина в байтах двоичного представления текущего объекта . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанной позиции. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Значение отрицательно или слишком велико, чтобы можно было скопировать весь объект в массив . + + + Возвращает максимально допустимую длину большого двоичного объекта непрозрачных данных для элементов управления доступом обратного вызова. + Допустимая длина большого двоичного объекта непрозрачных данных. + Значение true, если объект является элементом управления доступом обратного вызова. + + + Представляет список управления доступом и является базовым классом для классов и . + + + Возвращает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Возвращает количество элементов управления доступом в текущем объекте . + Количество элементов управления доступом в текущем объекте . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанной позиции. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + + + Возвращает логическое значение, которое указывает, расположены ли элементы управления доступом в текущем объекте в каноническом порядке. + Значение true, если элементы управления доступом в текущем текущем объекте расположены в каноническом порядке; в противном случае — значение false. + + + Определяет, является ли объект контейнером. + Значение true, если текущий объект является контейнером. + + + Определяет, является ли текущий объект списком управления доступом объекта каталога. + Значение true, если текущий объект является списком управления доступом объекта каталога. + + + Возвращает или задает объект с заданным индексом. + Параметр по указанному индексу. + Индекс (с нуля) возвращаемого или задаваемого . + + + Удаляет все элементы управления доступом, содержащиеся в данном объекте и связанные с объектом . + Объект для проверки. + + + Удаляет все наследуемые элементы управления доступом из данного объекта . + + + Возвращает уровень редакции объекта . + Байтовое значение, определяющее уровень редакции объекта . + + + Обеспечивает возможность управления доступом к объектам без непосредственной работы со списками управления доступом.Этот класс является абстрактным базовым классом для класса . + + + Инициализирует новый экземпляр класса . + Значение true, если новый объект является контейнером. + + + Добавляет указанное правило доступа в список управления доступом на уровне пользователей, связанный с данным объектом . + Добавляемое правило доступа. + + + Добавляет указанное правило аудита в системный список управления доступом, связанный с данным объектом . + Добавляемое правило аудита. + + + Получает коллекцию правил доступа, связанных с указанным идентификатором безопасности. + Коллекция правил доступа, связанных с указанным объектом . + Значение true, чтобы включить правила доступа, явным образом указанные для данного объекта. + Значение true, чтобы включить унаследованные правила доступа. + Определяет, относится ли идентификатор безопасности, для которого извлекаются правила доступа, к типу T:System.Security.Principal.SecurityIdentifier или к типу T:System.Security.Principal.NTAccount.Значение этого параметра должно иметь тип, который можно преобразовать в тип . + + + + + + Получает коллекцию правил аудита, связанных с указанным идентификатором безопасности. + Коллекция правил аудита, связанных с указанным объектом . + Значение true, чтобы включить правила аудита, явным образом указанные для данного объекта. + Значение true, чтобы включить унаследованные правила аудита. + Идентификатор безопасности, для которого извлекаются правила аудита.Это должен быть объект, который можно привести к типу . + + + + + + Применяет указанное изменение к списку управления доступом на уровне пользователей, связанному с данным объектом . + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + Применяемое изменение списка управления доступом на уровне пользователей. + Изменяемое правило доступа. + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + + + Применяет указанное изменение к системному списку управления доступом, связанному с данным объектом . + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + Применяемое изменение системного списка управления доступом. + Изменяемое правило аудита. + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + + + Удаляет правила доступа с тем же идентификатором безопасности и маской доступа, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом . + Значение true, если правило доступа успешно удалено; в противном случае — значение false. + Удаляемое правило доступа. + + + Удаляет все правила доступа с тем же идентификатором безопасности, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом . + Удаляемое правило доступа. + + + Удаляет все правила доступа, в точности совпадающие с указанным правилом доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом . + Удаляемое правило доступа. + + + Удаляет правила аудита с тем же идентификатором безопасности и маской доступа, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом . + Значение true, если правило аудита успешно удалено; в противном случае — значение false. + Удаляемое правило аудита. + + + Удаляет все правила аудита с тем же идентификатором безопасности, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом . + Удаляемое правило аудита. + + + Удаляет все правила аудита, в точности совпадающие с указанным правилом аудита, из системного списка управления доступом, связанного с текущим объектом . + Удаляемое правило аудита. + + + Удаляет все правила доступа из списка управления доступом на уровне пользователей (DACL), связанного с текущим объектом , а затем добавляет указанное правило доступа. + Сбрасываемое правило доступа. + + + Удаляет все правила доступа с тем же идентификатором и квалификатором безопасности, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом , а затем добавляет указанное правило доступа. + Устанавливаемое правило доступа. + + + Удаляет все правила аудита с тем же идентификатором и квалификатором безопасности, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом , а затем добавляет указанное правило аудита. + Устанавливаемое правило аудита. + + + Представляет дескриптор безопасности.Дескриптор безопасности включает владельца, основную группу, список управления доступом на уровне пользователей и системный список управления доступом. + + + Инициализирует новый экземпляр класса на основании указанного массива байтовых значений. + Значение true, если новый дескриптор безопасности связан с объектом-контейнером. + Значение true, если новый дескриптор безопасности связан с объектом каталога. + Массив байтовых значений, на основании которого необходимо создать новый объект . + Позиция в массиве , с которой начинается копирование. + + + Инициализирует новый экземпляр класса на основании указанных сведений. + Значение true, если новый дескриптор безопасности связан с объектом-контейнером. + Значение true, если новый дескриптор безопасности связан с объектом каталога. + Флаги, определяющие поведение нового объекта . + Владелец нового объекта . + Основная группа для нового объекта . + Системный список управления доступом нового объекта . + Список управления доступом на уровне пользователей нового объекта . + + + Инициализирует новый экземпляр класса на основании указанного объекта . + Значение true, если новый дескриптор безопасности связан с объектом-контейнером. + Значение true, если новый дескриптор безопасности связан с объектом каталога. + Объект , из которого создается новый объект . + + + Инициализирует новый экземпляр класса на основании указанной строки SDDL (Security Descriptor Definition Language). + Значение true, если новый дескриптор безопасности связан с объектом-контейнером. + Значение true, если новый дескриптор безопасности связан с объектом каталога. + Строка SDDL, на основании которой создается новый объект . + + + Задает свойство для данного экземпляра и наборы флаг. + Номер редакции нового объекта . + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Задает свойство для данного экземпляра и наборы флаг. + Номер редакции нового объекта . + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Получает значения, определяющие поведение объекта . + Один или несколько членов перечисления , объединенных с помощью операции логического ИЛИ. + + + Получает или задает список управления доступом на уровне пользователей для данного объекта .Список управления доступом на уровне пользователей содержит правила доступа. + Список управления доступом на уровне пользователей для данного объекта . + + + Получает или задает основную группу для данного объекта . + Основная группа для данного объекта . + + + Получает логическое значение, которое указывает, связан ли данный объект с объектом-контейнером. + Значение true, если объект связан с объектом , являющимся контейнером; в противном случае — значение false. + + + Получает логическое значение, указывающее, размещены ли элементы связанного с этим объектом списка управления доступом на уровне пользователей в каноническом порядке. + Значение true, если элементы связанного с этим объектом списка управления доступом на уровне пользователей размещены в каноническом порядке; в противном случае — значение false. + + + Получает логическое значение, которое указывает, связан ли данный объект с объектом каталога. + Значение true, если объект, связанный с этим объектом , является объектом каталога; в противном случае — значение false. + + + Получает логическое значение, указывающее, размещены ли элементы связанного с этим объектом системного списка управления доступом в каноническом порядке. + Значение true, если элементы связанного с этим объектом системного списка управления доступом размещены в каноническом порядке; в противном случае — значение false. + + + Получает или задает владельца объекта, связанного с данным объектом . + Владелец объекта, связанного с данным объектом . + + + Удаляет все правила доступа для указанного идентификатора безопасности из списка управления доступом на уровне пользователей, связанного с текущим объектом . + Идентификатор безопасности, для которого удаляются правила доступа. + + + Удаляет все правила аудита для указанного идентификатора безопасности из системного списка управления доступом, связанного с текущим объектом . + Идентификатор безопасности, для которого удаляются правила аудита. + + + Задает защиту от наследования для списка управления доступом на уровне пользователей, связанного с данным объектом .Защищенные списки управления доступом на уровне пользователей не наследуют правила доступа у родительских контейнеров. + Значение true, если список управления доступом на уровне пользователей защищается от наследования. + Значение true для сохранения наследуемых правил доступа в списке управления доступом на уровне пользователей; значение false для удаления наследуемых правил доступа из списка управления доступом на уровне пользователей. + + + Задает защиту от наследования для системного списка управления доступом, связанного с данным объектом .Защищенные системные списки управления доступом не наследуют правила аудита у родительских контейнеров. + Значение true, если системный список управления доступом защищается от наследования. + Значение true для сохранения наследуемых правил аудита в системном списке управления доступом; значение false для удаления наследуемых правил аудита из системного списка управления доступом. + + + Получает или задает системный список управления доступом для данного объекта .Системный список управления доступом содержит правила аудита. + Системный список управления доступом для данного объекта . + + + Представляет составной элемент управления доступом. + + + Инициализирует новый экземпляр класса . + Содержит флаги, определяющие параметры наследования и распространения наследования, а также условия аудита нового элемента управления доступом. + Маска доступа элемента управления доступом. + Значение из перечисления . + Объект , связанный с новым элементом управления доступом. + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Получает или задает тип этого объекта . + Тип данного объекта . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанного смещения. + Массив байтов, в который упаковывается содержимое объекта . + Позиция, с которой начинается маршалинг. + Значение отрицательно или слишком велико, чтобы можно было скопировать весь объект в массив . + + + Определяет тип объекта . + + + Объект используется для олицетворения. + + + Эти флаги влияют на поведение дескриптора безопасности. + + + Указывает, что список управления доступом на уровне пользователей автоматически наследуется у родительского элемента.Задается только диспетчером ресурсов. + + + Игнорируется. + + + Указывает, что список управления доступом на уровне пользователей был получен с помощью механизма установки значений по умолчанию.Задается только диспетчером ресурсов. + + + Указывает, что список управления доступом на уровне пользователей не равен null.Задается диспетчером ресурсов или пользователями. + + + Указывает, что диспетчер ресурсов не допускает автоматического наследования.Задается диспетчером ресурсов или пользователями. + + + Игнорируется. + + + Указывает, что группа была получена с помощью механизма установки значений по умолчанию.Задается только диспетчером ресурсов; не должен задаваться вызывающими объектами. + + + Нет флагов управления. + + + Указывает, что владелец был получен с помощью механизма установки значений по умолчанию.Задается только диспетчером ресурсов; не должен задаваться вызывающими объектами. + + + Указывает, что содержимое поля Reserved действительно. + + + Указывает, что двоичное представление дескриптора безопасности не относительное. Этот флаг всегда установлен. + + + Игнорируется. + + + Указывает, что системный список управления доступом автоматически наследуется у родительского элемента.Задается только диспетчером ресурсов. + + + Игнорируется. + + + Указывает, что системный список управления доступом был получен с помощью механизма установки значений по умолчанию.Задается только диспетчером ресурсов. + + + Указывает, что системный список управления доступом не равен null.Задается диспетчером ресурсов или пользователями. + + + Указывает, что диспетчер ресурсов не допускает автоматического наследования.Задается диспетчером ресурсов или пользователями. + + + Представляет элемент управления доступом, тип которого не является членом перечисления . + + + Инициализирует новый экземпляр класса . + Тип нового элемента управления доступом.Значение должно быть больше, чем . + Флаги, определяющие параметры наследования и распространения наследования, а также условия аудита нового элемента управления доступом. + Массив байтовых значений, содержащий данные нового элемента управления доступом.Это значение может быть равно null.Длина этого массива не должна превышать значения поля и должно быть кратным четырем. + Значение параметра не превышает или длина массива превышает значение поля или не кратна четырем. + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанного смещения. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Параметр имеет отрицательное или слишком большое значение, чтобы можно было скопировать весь объект в параметр . + + + Возвращает длину непрозрачных данных, связанных с этим объектом . + Массив байтов, представляющий непрозрачные данные, связанные с данным объектом . + + + Возвращает максимально допустимую длину большого двоичного объекта непрозрачных данных для данного объекта . + + + Получает длину непрозрачных данных, связанных с этим объектом . + Длина непрозрачных данных обратного вызова в байтах. + + + Задает непрозрачные данные обратного вызова, связанные с этим объектом . + Массив байтов, представляющий непрозрачные данные обратного вызова для данного объекта . + + + Представляет список управления доступом на уровне пользователей. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Номер редакции нового объекта . + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Инициализирует новый экземпляр класса с указанными значениями из указанного объекта . + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Базовый объект , соответствующий новому объекту .Чтобы создать пустой список управления доступом, укажите значение null. + + + Добавляет элемент управления доступом с указанными параметрами к текущему объекту . + Тип добавляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого добавляется элемент управления доступом. + Правило доступа для нового элемента управления доступом. + Флаги, определяющие свойства наследования нового элемента управления доступом. + Флаги, определяющие свойства распространения наследования нового элемента управления доступом. + + + Добавляет элемент управления доступом с указанными параметрами к текущему объекту .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта для нового элемента управления доступом. + Тип добавляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого добавляется элемент управления доступом. + Правило доступа для нового элемента управления доступом. + Флаги, определяющие свойства наследования нового элемента управления доступом. + Флаги, определяющие свойства распространения наследования нового элемента управления доступом. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется новый элемент управления доступом. + Идентификатор класса дочерних объектов, которые могут наследовать новый элемент управления доступом. + + + Добавляет элемент управления доступом с указанными параметрами к текущему объекту . + Тип добавляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого добавляется элемент управления доступом. + + Для новых доступа. + + + Удаляет указанное правило управления доступом из текущего объекта . + Значение true, если метод успешно удаляет указанное правило доступа; в противном случае — значение false. + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется правило управления доступом. + Маска доступа для удаляемого правила. + Флаги, определяющие свойства наследования удаляемого правила. + Флаги, определяющие свойства распространения наследования удаляемого правила. + + + Удаляет указанное правило управления доступом из текущего объекта .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта. + Значение true, если метод успешно удаляет указанное правило доступа; в противном случае — значение false. + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется правило управления доступом. + Маска доступа для удаляемого правила управления доступом. + Флаги, определяющие свойства наследования удаляемого правила управления доступом. + Флаги, определяющие свойства распространения наследования удаляемого правила управления доступом. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется удаляемое правило управления доступом. + Идентификатор класса дочерних объектов, которые могут наследовать удаляемое правило управления доступом. + + + Удаляет указанное правило управления доступом из текущего объекта . + Возвращает . + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется правило управления доступом. + + Для которого необходимо удалить доступ. + + + Удаляет указанный элемент управления доступом из текущего объекта . + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется элемент управления доступом. + Маска доступа для удаляемого элемента управления доступом. + Флаги, определяющие свойства наследования удаляемого элемента управления доступом. + Флаги, определяющие свойства распространения наследования удаляемого элемента управления доступом. + + + Удаляет указанный элемент управления доступом из текущего объекта .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта для удаляемого элемента управления доступом. + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется элемент управления доступом. + Маска доступа для удаляемого элемента управления доступом. + Флаги, определяющие свойства наследования удаляемого элемента управления доступом. + Флаги, определяющие свойства распространения наследования удаляемого элемента управления доступом. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется удаляемый элемент управления доступом. + Идентификатор класса дочерних объектов, которые могут наследовать удаляемый элемент управления доступом. + + + Удаляет указанный элемент управления доступом из текущего объекта . + Тип удаляемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого удаляется элемент управления доступом. + + Для которого необходимо удалить доступ. + + + Задает указанный элемент управления доступом для указанного объекта . + Тип устанавливаемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого нужно установить элемент управления доступом. + Правило доступа для нового элемента управления доступом. + Флаги, определяющие свойства наследования нового элемента управления доступом. + Флаги, определяющие свойства распространения наследования нового элемента управления доступом. + + + Задает указанный элемент управления доступом для указанного объекта . + Тип устанавливаемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого нужно установить элемент управления доступом. + Правило доступа для нового элемента управления доступом. + Флаги, определяющие свойства наследования нового элемента управления доступом. + Флаги, определяющие свойства распространения наследования нового элемента управления доступом. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется новый элемент управления доступом. + Идентификатор класса дочерних объектов, которые могут наследовать новый элемент управления доступом. + + + Задает указанный элемент управления доступом для указанного объекта . + Тип устанавливаемого элемента управления доступом («разрешить» или «запретить»). + Объект , для которого нужно установить элемент управления доступом. + + Для которого требуется задать доступ. + + + Представляет элемент управления доступом и является базовым классом для всех остальных классов элементов управления доступом. + + + Получает или задает объект , связанный с объектом . + Объект , связанный с данным объектом . + + + Получает тип данного элемента управления доступом. + Тип данного элемента управления доступом. + + + Получает сведения об аудите, связанные с данным элементом управления доступом. + Сведения об аудите, связанные с данным элементом управления доступом. + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Создает глубокую копию данного элемента управления доступом. + Объект , создаваемый с помощью данного метода. + + + Создает объект из указанных двоичных данных. + Объект , созданный с помощью данного метода. + Двоичные данные, из которых создается новый объект . + Позиция, с которой начинается распаковка. + + + Определяет, равен ли заданный объект текущему объекту . + Значение true, если заданный объект равен текущему объекту ; в противном случае — значение false. + Объект , который требуется сравнить с текущим объектом . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанного смещения. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Параметр имеет отрицательное или слишком большое значение, чтобы можно было скопировать весь объект в параметр . + + + Служит хэш-функцией для класса .Метод можно использовать в алгоритмах хэширования и структурах данных, подобных хэш-таблицам. + Хэш-код для текущего объекта . + + + Получает флаги, определяющие свойства наследования данного элемента управления доступом. + Флаги, определяющие свойства наследования данного элемента управления доступом. + + + Получает логическое значение, определяющее, наследуется данный элемент управления доступом или задается явным образом. + Значение true, если элемент управления доступом наследуется; в противном случае — false. + + + Определяет, считаются ли равными заданные объекты . + Значение true, если два объекта равны; в противном случае — значение false. + Первый сравниваемый объект . + Второй объект для сравнения. + + + Определяет, считаются ли заданные объекты неравными. + Значение true, если два объекта не равны; в противном случае — значение false. + Первый сравниваемый объект . + Второй объект для сравнения. + + + Получает флаги, определяющие свойства распространения наследования данного элемента управления доступом. + Флаги, определяющие свойства распространения наследования данного элемента управления доступом. + + + Представляет список управления доступом и является базовым классом для классов , , и . + + + Инициализирует новый экземпляр класса . + + + Номер редакции текущего объекта .Это значение возвращается свойством списков управления доступом, не связанных с объектами служб каталогов. + + + Номер редакции текущего объекта .Это значение возвращается свойством списков управления доступом, связанных с объектами служб каталогов. + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Копирует все элементы текущего объекта в указанный массив. + Массив, в который помещаются копии элементов текущего объекта . + Отсчитываемый от нуля индекс позиции в массиве , с которой начинается копирование. + + + Получает количество элементов управления доступом в текущем объекте . + Количество элементов управления доступом в текущем объекте . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанного смещения. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Параметр имеет отрицательное или слишком большое значение, чтобы можно было скопировать весь объект в параметр . + + + Возвращает новый экземпляр класса . + Возвращаемое данным методом значение . + + + Этому свойству всегда присваивается значение false.Оно реализуется только потому, что оно требуется для реализации интерфейса . + Всегда имеет значение false. + + + Получает или задает объект с указанным индексом. + Объект с указанным индексом. + Начинающийся с нуля индекс получаемого или задаваемого объекта . + + + Максимально допустимая двоичная длина объекта . + + + Получает уровень редакции объекта . + Байтовое значение, определяющее уровень редакции объекта . + + + Данное свойство всегда возвращает значение null.Оно реализуется только потому, что оно требуется для реализации интерфейса . + Всегда возвращает значение null. + + + Копирует все элементы текущего объекта в указанный массив. + Массив, в который помещаются копии элементов текущего объекта . + Отсчитываемый от нуля индекс позиции в массиве , с которой начинается копирование. + + + Возвращает новый экземпляр класса , являющийся реализацией интерфейса . + Новый объект , являющийся реализацией интерфейса . + + + Представляет дескриптор безопасности.Дескриптор безопасности включает владельца, основную группу, список управления доступом на уровне пользователей и системный список управления доступом. + + + Инициализирует новый экземпляр класса . + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Получает значения, определяющие поведение объекта . + Один или несколько членов перечисления , объединенных с помощью операции логического ИЛИ. + + + Возвращает массив байтовых значений, представляющих информацию, которая содержится в объекте . + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Значение отрицательно или слишком велико, чтобы можно было скопировать весь объект в массив . + + + Возвращает представление указанных разделов дескриптора безопасности, представляемого данным объектом , в формате SDDL (Security Descriptor Definition Language). + Представление указанных разделов связанного с данным объектом дескриптора безопасности в формате SDDL. + Определяет получаемые разделы дескриптора безопасности (правила доступа, правила аудита, основная группа, владелец). + + + Получает или задает основную группу для данного объекта . + Основная группа для данного объекта . + + + Возвращает логическое значение, которое указывает, можно ли преобразовать связанный с данным объектом дескриптор безопасности в формат SDDL (Security Descriptor Definition Language). + Значение true, если связанный с данным объектом дескриптор безопасности можно преобразовать в формат SDDL; в противном случае — значение false. + + + Получает или задает владельца объекта, связанного с данным объектом . + Владелец объекта, связанного с данным объектом . + + + Получает номер редакции объекта . + Байтовое значение, определяющее уровень редакции объекта . + + + Флаги наследования определяют семантику наследования элементов управления доступом. + + + Элемент управления доступом наследуется дочерними объектами-контейнерами. + + + Элемент управления доступом не наследуется дочерними объектами. + + + Элемент управления доступом наследуется дочерними конечными объектами. + + + Инкапсулирует все типы элементов управления доступом, которые в настоящее время определены корпорацией Майкрософт.Все объекты содержат 32-битные маски доступа и объект . + + + Получает или задает маску доступа для данного объекта . + Маска доступа для данного объекта . + + + Получает или задает объект , связанный с данным объектом . + Объект , связанный с данным объектом . + + + Обеспечивает возможность управления доступом к основным объектам без непосредственной работы со списками управления доступом.Основные объекты определены в перечислении . + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + + + Инициализирует новый экземпляр класса с использованием указанных значений.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + Дескриптор защищаемого объекта, с которым связан новый объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо включить в данный объект . + + + Инициализирует новый экземпляр класса с использованием указанных значений.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + Дескриптор защищаемого объекта, с которым связан новый объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо включить в данный объект . + Делегат, реализованный интеграторами и обеспечивающий дополнительные исключения. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Инициализирует новый экземпляр , используя указанные значения. + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + Делегат, реализованный интеграторами и обеспечивающий дополнительные исключения. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Инициализирует новый экземпляр класса с использованием указанных значений.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + Имя защищаемого объекта, с которым связан новый объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо включить в данный объект . + + + Инициализирует новый экземпляр класса с использованием указанных значений.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Значение true, если новый объект является контейнером. + Тип защищаемого объекта, с которым связан новый объект . + Имя защищаемого объекта, с которым связан новый объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо включить в данный объект . + Делегат, реализованный интеграторами и обеспечивающий дополнительные исключения. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Дескриптор защищаемого объекта, с которым связан данный объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + Защищаемый объект, с которым связан данный объект , является каталогом или файлом, который не удается найти. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Дескриптор защищаемого объекта, с которым связан данный объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + Защищаемый объект, с которым связан данный объект , является каталогом или файлом, который не удается найти. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Имя защищаемого объекта, с которым связан данный объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + Защищаемый объект, с которым связан данный объект , является каталогом или файлом, который не удается найти. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Примечания". + Имя защищаемого объекта, с которым связан данный объект . + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + Защищаемый объект, с которым связан данный объект , является каталогом или файлом, который не удается найти. + + + Обеспечивает для интеграторов способ сопоставления числовых кодов ошибок с конкретными создаваемыми ими исключениями. + Исключение , создаваемое этим делегатом. + Числовой код ошибки. + Имя защищаемого объекта, с которым связан объект . + Дескриптор защищаемого объекта, с которым связан объект . + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Представляет сочетание идентификатора пользователя, маски доступа и типа управления доступом ("разрешить" или "запретить").Кроме того, в объекте содержатся сведения о типе объекта, к которому относится правило, типе дочернего объекта, который может наследовать правило, способе наследования правила дочерними объектами, а также способе распространения этого наследования. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Идентификатор, к которому применяется правило доступа. Это должен быть объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Определяет свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Тип объекта, к которому применяется правило доступа. + Тип дочернего объекта, который может наследовать данное правило. + Определяет тип правила ("разрешить" или "запретить"). + Значение параметра нельзя привести к типу или параметр содержит недопустимое значение. + Значение параметра равно 0 или параметр или содержит неизвестное значение флага. + + + Получает тип дочернего объекта, который может наследовать объект . + Тип дочернего объекта, который может наследовать объект . + + + Получает флаги, определяющие, содержат ли свойства и объекта допустимые значения. + + указывает на то, что свойство содержит допустимое значение. указывает на то, что свойство содержит допустимое значение.Эти значения можно объединять с помощью операции логического ИЛИ. + + + Получает тип объекта, к которому применяется . + Тип объекта, к которому применяется . + + + Обеспечивает управление доступом к объектам служб каталогов.Этот класс представляет элемент управления доступом, связанный с объектом каталога. + + + Инициализирует новый экземпляр класса . + Наследование, распространение наследования, условия аудита для нового элемента управления доступом. + Функция нового элемента управления доступом. + Маска доступа элемента управления доступом. + Объект , связанный с новым элементом управления доступом. + Определяет, содержат ли параметры и допустимые значения GUID. + Идентификатор GUID, определяющий тип объекта, к которому относится новый элемент управления доступом. + Идентификатор GUID, определяющий тип объекта, который может наследовать новый элемент управления доступом. + Значение true, если новый элемент управления доступом является элементом управления доступом типа обратного вызова. + Непрозрачные данные, связанные с новым элементом управления доступом.Допустимо только для элементов управления доступом обратного вызова.Длина этого массива не должна превышать значения, возвращаемого методом . + Параметр qualifier содержит недопустимое значение или длина параметра opaque превышает значение, возвращаемое методом . + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанной позиции. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Значение отрицательно или слишком велико, чтобы можно было скопировать весь объект в массив . + + + Получает или задает GUID типа объекта, который может наследовать элемент управления доступом, представляемый данным объектом . + GUID типа объекта, который может наследовать элемент управления доступом, представляемый данным объектом . + + + Возвращает максимально допустимую длину (в байтах) большого двоичного объекта непрозрачных данных для элементов управления доступом обратного вызова. + Максимально допустимая длина (в байтах) большого двоичного объекта непрозрачных данных элементов управления доступом обратного вызова. + Значение true, если объект является элементом управления доступом обратного вызова. + + + Получает или задает флаги, определяющие, содержат ли свойства и значения, соответствующие допустимым типам объектов. + Один или несколько членов перечисления , объединенные с помощью операции логического ИЛИ. + + + Получает или задает GUID типа объекта, связанного с объектом . + GUID типа объекта, связанного с объектом . + + + Определяет наличие типов объектов для элементов управления доступом. + + + Тип объекта, который может наследовать элемент управления доступом. + + + Тип объекта отсутствует. + + + Присутствует тип объекта, связанный с элементом управления доступом. + + + Представляет сочетание идентификатора пользователя, маски доступа и условий аудита.Кроме того, в объекте содержатся сведения о типе объекта, к которому относится данное правило, типе дочернего объекта, который может наследовать правило, способе наследования правила дочерними объектами, а также о способе распространения этого наследования. + + + Инициализирует новый экземпляр класса . + Идентификатор, к которому применяется правило доступа. Это должен быть объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Определяет свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Тип объекта, к которому применяется правило доступа. + Тип дочернего объекта, который может наследовать данное правило. + Условия аудита. + Значение параметра нельзя привести к типу или параметр содержит недопустимое значение. + Значение параметра равно 0 или параметр или содержит неизвестное значение флага. + + + Получает тип дочернего объекта, который может наследовать объект . + Тип дочернего объекта, который может наследовать объект . + + + Свойства и объекта содержат недопустимые значения. + + указывает на то, что свойство содержит допустимое значение. указывает на то, что свойство содержит допустимое значение.Эти значения можно объединять с помощью операции логического ИЛИ. + + + Получает тип объекта, к которому применяется . + Тип объекта, к которому применяется . + + + Обеспечивает возможность управлять доступом к объектам без непосредственной работы со списками управления доступом.Данный класс является абстрактным базовым классом для классов и . + + + Инициализирует новый экземпляр класса . + + + Инициализирует новый экземпляр класса . + Значение true, если новый объект является объектом контейнера. + Значение true, если новый объект является объектом каталога. + + + Инициализирует новый экземпляр класса . + Значение нового экземпляра класса . + + + Получает значение защищаемого объекта, связанного с данным объектом . + Тип защищаемого объекта, связанного с данным объектом . + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Объект , созданный данным методом. + Идентификатор, к которому применяется правило доступа.Это должен быть объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Определяет свойства наследования правила доступа. + Определяет возможность автоматического распространения наследуемых правил доступа.Флаги распространения игнорируются, если параметр имеет значение . + Указывает допустимый тип управления доступом. + + + Получает или задает логическое значение, которое указывает, были ли изменены правила доступа, связанные с данным объектом . + Значение true, если связанные с данным объектом правила доступа были изменены; в противном случае — значение false. + + + Получает значение объекта, связанного с правилами доступа к данному объекту .Объект должен являться объектом, который можно привести к объекту . + Тип объекта, связанного с правилами доступа к данному объекту . + + + Получает логическое значение, которое указывает, следуют ли правила доступа, связанные с данным объектом , в каноническом порядке + Значение true, если правила доступа следуют в каноническом порядке; в противном случае — значение false. + + + Получает логическое значение, которое указывает, защищен ли список управления доступом на уровне пользователей, связанный с этим объектом . + Значение true, если список управления доступом на уровне пользователей защищен; в противном случае — значение false. + + + Получает логическое значение, которое указывает, следуют ли правила аудита, связанные с данным объектом , в каноническом порядке + Значение true, если правила аудита следуют в каноническом порядке; в противном случае — значение false. + + + Получает логическое значение, которое указывает, защищен ли системный список управления доступом, связанный с этим объектом . + Значение true, если системный список управления доступом защищен; в противном случае — значение false. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Объект , созданный данным методом. + Идентификатор, к которому применяется правило аудита.Это должен быть объект, который можно привести к типу . + Маска доступа данного правила.Маска доступа представляет собой группу из 32 анонимных битов, значение каждого из которых определяется отдельными интеграторами. + Значение true, если данное правило наследуется у родительского контейнера. + Определяет свойства наследования правила аудита. + Определяет возможность автоматического распространения наследуемых правил аудита.Флаги распространения игнорируются, если параметр имеет значение . + Определяет условия, при которых правило проходит аудит. + + + Получает или задает логическое значение, которое указывает, были ли изменены правила аудита, связанные с данным объектом . + Значение true, если связанные с данным объектом правила аудита были изменены; в противном случае — значение false. + + + Получает значение объекта, связанного с правилами аудита для данного объекта .Объект должен являться объектом, который можно привести к объекту . + Тип объекта, связанного с правилами аудита для данного объекта . + + + Получает основную группу, связанную с указанным владельцем. + Основная группа, связанная с указанным владельцем. + Владелец, для которого получается основная группа. + + + + + + Получает владельца, связанного с указанной основной группой. + Владелец, связанный с указанной основной группой. + Основная группа, для которой получается владелец. + + + + + + Возвращает массив байтовых значений, представляющих информацию дескриптора безопасности для данного объекта . + Массив байтовых значений, представляющих дескриптор безопасности для данного объекта .Этот метод возвращает значение null, если информация о безопасности данного объекта отсутствует. + + + Возвращает представление указанных разделов связанного с данным объектом дескриптора безопасности в формате SDDL (Security Descriptor Definition Language). + Представление указанных разделов связанного с данным объектом дескриптора безопасности в формате SDDL. + Определяет получаемые разделы дескриптора безопасности (правила доступа, правила аудита, основная группа, владелец). + + + Получает или задает логическое значение, которое указывает, была ли изменена группа, связанная с защищаемым объектом. + Значение true, если связанная с защищаемым объектом группа была изменена; в противном случае — значение false. + + + Получает логическое значение, которое указывает, является ли данный объект контейнером. + Значение true, если объект является контейнером; в противном случае — значение false. + + + Получает логическое значение, которое указывает, является ли данный объект объектом каталога. + Значение true, если объект является объектом каталога; в противном случае — значение false. + + + Возвращает логическое значение, которое указывает, можно ли преобразовать связанный с данным объектом дескриптор безопасности в формат SDDL (Security Descriptor Definition Language). + Значение true, если связанный с данным объектом дескриптор безопасности можно преобразовать в формат SDDL; в противном случае — значение false. + + + Применяет указанное изменение к списку управления доступом на уровне пользователей, связанному с данным объектом . + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + Применяемое изменение списка управления доступом на уровне пользователей. + Изменяемое правило доступа. + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + + + Применяет указанное изменение к списку управления доступом на уровне пользователей, связанному с данным объектом . + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + Применяемое изменение списка управления доступом на уровне пользователей. + Изменяемое правило доступа. + Значение true, если список управления доступом на уровне пользователей успешно изменен; в противном случае — значение false. + + + Применяет указанное изменение к системному списку управления доступом, связанному с данным объектом . + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + Применяемое изменение системного списка управления доступом. + Изменяемое правило аудита. + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + + + Применяет указанное изменение к системному списку управления доступом, связанному с данным объектом . + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + Применяемое изменение системного списка управления доступом. + Изменяемое правило аудита. + Значение true, если системный список управления доступом успешно изменен; в противном случае — значение false. + + + Получает или задает логическое значение, которое указывает, был ли изменен владелец защищаемого объекта. + Значение true, если владелец защищаемого объекта был изменен; в противном случае — значение false. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Замечания". + Значение true, чтобы включить разрешения, позволяющие вызывающему коду получать объект во владение. + Имя, необходимое для извлечения сохраненной информации. + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Замечания". + Дескриптор, необходимый для извлечения сохраненной информации. + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + + + Сохраняет указанные разделы дескриптора безопасности, связанного с данным объектом , в постоянном хранилище.Рекомендуется, чтобы значения параметров , передаваемых конструктору и методам сохранения, были одинаковыми.Дополнительные сведения см. в разделе "Замечания". + Имя, необходимое для извлечения сохраненной информации. + Одно из значений перечисления , определяющее разделы дескриптора безопасности защищаемого объекта (правила доступа, правила аудита, владелец, основная группа), которые необходимо сохранить. + + + Удаляет все правила доступа, связанные с указанным объектом . + Объект , для которого удаляются все правила доступа. + Все правила доступа указаны не в каноническом порядке. + + + Удаляет все правила аудита, связанные с указанным объектом . + Объект , для которого удаляются все правила аудита. + Все правила аудита указаны не в каноническом порядке. + + + Блокирует доступ для чтения к объекту . + + + Разблокирует доступ для чтения к объекту . + + + Устанавливает или снимает защиту правил доступа, связанных с данным объектом .Защищенные правила доступа не могут изменяться родительскими объектами через наследование. + Значение true для защиты правила доступа, связанного с данным объектом , от наследования; значение false для разрешения наследования. + Значение true для сохранения наследуемых правил доступа; значение false для удаления наследуемых правил доступа.Данный параметр игнорируется, если параметр имеет значение false. + Этот метод пытается удалить наследуемые правила из списка управления доступом на уровне пользователей в неканонической форме. + + + Устанавливает или снимает защиту правил аудита, связанных с данным объектом .Защищенные правила аудита не могут изменяться родительскими объектами через наследование. + Значение true для защиты правила аудита, связанного с данным объектом , от наследования; значение false для разрешения наследования. + Значение true для сохранения наследуемых правил аудита; значение false для удаления наследуемых правил аудита.Данный параметр игнорируется, если параметр имеет значение false. + Этот метод пытается удалить наследуемые правила из системного списка управления доступом в неканонической форме. + + + Задает основную группу для дескриптора безопасности, связанного с данным объектом . + Задаваемая основная группа. + + + Задает владельца для дескриптора безопасности, связанного с данным объектом . + Задаваемый владелец. + + + Задает дескриптор безопасности для данного объекта на основании указанного массива байтовых значений. + Массив байтов, на основании которого задается дескриптор безопасности. + + + Задает указанные разделы дескриптора безопасности для данного объекта на основании указанного массива байтовых значений. + Массив байтов, на основании которого задается дескриптор безопасности. + Задаваемые разделы дескриптора безопасности (правила доступа, правила аудита, владелец, основная группа). + + + Задает дескриптор безопасности для данного объекта на основании указанной строки SDDL (Security Descriptor Definition Language). + Строка SDDL, на основании которой задается дескриптор безопасности. + + + Задает указанные разделы дескриптора безопасности для данного объекта на основании указанной строки SDDL (Security Descriptor Definition Language). + Строка SDDL, на основании которой задается дескриптор безопасности. + Задаваемые разделы дескриптора безопасности (правила доступа, правила аудита, владелец, основная группа). + + + Блокирует доступ для записи к объекту . + + + Разблокирует доступ для записи к объекту . + + + Обеспечивает возможность управления доступом к объектам каталога без непосредственной работы со списками управления доступом; также дает возможность приводить тип для прав доступа. + Права доступа для объекта. + + + Инициализирует новый экземпляр класса ObjectSecurity`1. + Значение true, если новый объект является объектом контейнера. + Тип ресурса. + + + Инициализирует новый экземпляр класса ObjectSecurity`1. + Значение true, если новый объект является объектом контейнера. + Тип ресурса. + Дескриптор. + Разделы, которые необходимо включить. + + + Инициализирует новый экземпляр класса ObjectSecurity`1. + Значение true, если новый объект является объектом контейнера. + Тип ресурса. + Дескриптор. + Разделы, которые необходимо включить. + Делегат, реализованный интеграторами и обеспечивающий дополнительные исключения. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Инициализирует новый экземпляр класса ObjectSecurity`1. + Значение true, если новый объект является объектом контейнера. + Тип ресурса. + Имя защищаемого объекта, с которым связан новый объект . + Разделы, которые необходимо включить. + + + Инициализирует новый экземпляр класса ObjectSecurity`1. + Значение true, если новый объект является объектом контейнера. + Тип ресурса. + Имя защищаемого объекта, с которым связан новый объект . + Разделы, которые необходимо включить. + Делегат, реализованный интеграторами и обеспечивающий дополнительные исключения. + Объект, содержащий контекстные сведения об источнике или назначении исключения. + + + Получает тип защищаемого объекта, связанного с правилами аудита данного объекта ObjectSecurity`1. + Тип защищаемого объекта, связанный с текущим экземпляром. + + + Инициализирует новый экземпляр класса ObjectAccessRule, представляющий новое правило управления доступом для связанного объекта безопасности. + Представляет новое правило управления доступом для указанного пользователя с указанными правами, типом управления доступом и флагами. + Представляет учетную запись пользователя. + Тип доступа. + Значение true, если правило доступа наследуется; в противном случае — значение false. + Определяет, как выполнять распространение масок доступа на дочерние объектам. + Определяет порядок распространения действия элементов управления доступом на дочерние объекты. + Определяет, разрешен или запрещен доступ. + + + Получает тип объекта, связанного с правилами доступа данного объекта ObjectSecurity`1. + Тип объекта, связанного с правилами доступа для текущего экземпляра. + + + Добавляет указанное правило доступа в список управления доступом на уровне пользователей, связанный с данным объектом ObjectSecurity`1. + Добавляемое правило. + + + Добавляет указанное правило аудита в системный список управления доступом, связанный с данным объектом ObjectSecurity`1. + Добавляемое правило аудита. + + + Инициализирует новый экземпляр класса , который представляет указанное правило аудита для указанного пользователя. + Возвращает указанное правило аудита для указанного пользователя. + Представляет учетную запись пользователя. + Целочисленное значение, задающее тип доступа. + Значение true, если правило доступа наследуется; в противном случае — значение false. + Определяет, как выполнять распространение масок доступа на дочерние объектам. + Определяет порядок распространения действия элементов управления доступом на дочерние объекты. + Описывает тип аудита для выполнения. + + + Получает объект Type, связанный с правилами аудита данного объекта ObjectSecurity`1. + объект Type, связанный с правилами аудита для текущего экземпляра. + + + Сохраняет дескриптора безопасности, связанного с данным объектом ObjectSecurity`1, в постоянном хранилище, используя указанный дескриптор. + Дескриптор защищаемого объекта, с которым связан данный объект ObjectSecurity`1. + + + Сохраняет дескриптора безопасности, связанного с данным объектом ObjectSecurity`1, в постоянном хранилище, используя указанное имя. + Имя защищаемого объекта, с которым связан данный объект ObjectSecurity`1. + + + Удаляет правила доступа с тем же идентификатором безопасности и маской доступа, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом ObjectSecurity`1. + Возвращает Значение true, если правило доступа успешно удалено; в противном случае — значение false. + Удаляемая правило. + + + Удаляет все правила доступа с тем же идентификатором безопасности, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом ObjectSecurity`1. + Удаляемое правило доступа. + + + Удаляет все правила доступа, в точности совпадающие с указанным правилом доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом ObjectSecurity`1. + Удаляемое правило доступа. + + + Удаляет правила аудита с тем же идентификатором безопасности и маской доступа, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом ObjectSecurity`1. + Возвращает значение true, если объект был удален; в противном случае — значение false. + Удаляемое правило аудита. + + + Удаляет все правила аудита с тем же идентификатором безопасности, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом ObjectSecurity`1. + Удаляемое правило аудита. + + + Удаляет все правила аудита, в точности совпадающие с указанным правилом аудита, из системного списка управления доступом, связанного с текущим объектом ObjectSecurity`1. + Удаляемое правило аудита. + + + Удаляет все правила доступа из списка управления доступом на уровне пользователей (DACL), связанного с текущим объектом ObjectSecurity`1, а затем добавляет указанное правило доступа. + Сбрасываемое правило доступа. + + + Удаляет все правила доступа с тем же идентификатором и квалификатором безопасности, что и у указанного правила доступа, из списка управления доступом на уровне пользователей, связанного с текущим объектом ObjectSecurity`1, а затем добавляет указанное правило доступа. + Устанавливаемое правило доступа. + + + Удаляет все правила аудита с тем же идентификатором и квалификатором безопасности, что и у указанного правила аудита, из системного списка управления доступом, связанного с текущим объектом ObjectSecurity`1, а затем добавляет указанное правило аудита. + Устанавливаемое правило аудита. + + + Исключение вызывается, когда метод в пространстве имен пытается использовать отсутствующую у него привилегию. + + + Инициализирует новый экземпляр класса . + + + Инициализирует новый экземпляр класса с использованием заданного права. + Отсутствующее право. + + + Инициализирует новый экземпляр класса с использованием указанного исключения. + Отсутствующее право. + Исключение, которое вызвало текущее исключение.Если параметр не является указателем null (Nothing в Visual Basic), то текущее исключение сгенерировано в блоке catch, обрабатывающем внутреннее исключение. + + + Получает имя отсутствующего права. + Имя права, которым не удалось воспользоваться методу. + + + Определяет порядок распространения действия элементов управления доступом на дочерние объекты. Эти флаги имеют значение лишь в том случае, когда имеются флаги наследования. + + + Указывает, что элемент управления доступом распространяется только на дочерние объекты.К ним относятся контейнеры и конечные дочерние объекты. + + + Указывает, что флаги наследования не установлены. + + + Указывает, что элемент управления доступом не распространяется на дочерние объекты. + + + Представляет элемент управления доступом, содержащий квалификатор.Квалификатор, представляемый объектом , определяет функцию элемента управления доступом — разрешение доступа, запрет доступа, вызов системного аудита или системного оповещения.Класс является абстрактным базовым классом для классов и . + + + Получает значение, определяющее функцию элемента управления доступом — разрешение доступа, запрет доступа, вызов системного аудита или системного оповещения. + Значение, определяющее функцию элемента управления доступом — разрешение доступа, запрет доступа, вызов системного аудита или системного оповещения. + + + Возвращает длину непрозрачных данных обратного вызова, связанных с этим объектом . + Массив байтов, представляющий непрозрачные данные обратного вызова, связанные с данным объектом . + + + Определяет, содержит ли этот объект данные обратного вызова. + Значение true, если этот объект содержит данные обратного вызова; в противном случае — значение false. + + + Получает длину непрозрачных данных обратного вызова, связанных с этим объектом .Это свойство применимо только к элементам управления доступом обратного вызова. + Длина непрозрачных данных обратного вызова в байтах. + + + Задает непрозрачные данные обратного вызова, связанные с этим объектом . + Массив байтов, представляющий непрозрачные данные обратного вызова для данного объекта . + + + Представляет список управления доступом. + + + Инициализирует новый экземпляр класса с заданным номером редакции. + Номер редакции нового списка управления доступом. + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Инициализирует новый экземпляр класса из указанной двоичной формы. + Массив байтовых значений, представляющий список управления доступом. + Позиция в массиве , с которой начинается распаковка данных. + + + Получает длину в байтах двоичного представления текущего объекта .Эта длина должна использоваться перед маршалингом списка управления доступом в двоичный массив с помощью метода . + Длина в байтах двоичного представления текущего объекта . + + + Получает количество элементов управления доступом в текущем объекте . + Количество элементов управления доступом в текущем объекте . + + + Маршалирует содержимое объекта в указанный массив байтов, начиная с указанного смещения. + Массив байтов, в который маршалируется содержимое объекта . + Позиция, с которой начинается маршалинг. + Значение отрицательно или слишком велико, чтобы можно было скопировать весь объект в массив . + + + Вставляет указанный элемент управления доступом по указанному индексу. + Позиция, куда добавляются новые элементы управления доступом.Укажите значение свойства , чтобы поместить элемент управления доступом в конец объекта . + Вставляемый элемент управления доступом. + Параметр имеет отрицательное или слишком большое значение, чтобы можно было скопировать весь объект в параметр . + + + Получает или задает элемент управления доступом по указанному индексу. + Элемент управления доступом по указанному индексу. + Индекс (с нуля) получаемого или задаваемого элемента управления доступом. + + + Удаляет элемент управления доступом по указанному индексу. + Отсчитываемый с нуля индекс удаляемого элемента управления доступом. + Значение параметра превышает значение свойства минус один или отрицательно. + + + Получает уровень редакции объекта . + Байтовое значение, определяющее уровень редакции объекта . + + + Представляет дескриптор безопасности.Дескриптор безопасности включает владельца, основную группу, список управления доступом на уровне пользователей и системный список управления доступом. + + + Инициализирует новый экземпляр класса на основании указанного массива байтовых значений. + Массив байтовых значений, на основании которого необходимо создать новый объект . + Позиция в массиве , с которой начинается копирование. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Флаги, определяющие поведение нового объекта . + Владелец нового объекта . + Основная группа для нового объекта . + Системный список управления доступом нового объекта . + Список управления доступом на уровне пользователей нового объекта . + + + Инициализирует новый экземпляр класса на основании указанной строки SDDL (Security Descriptor Definition Language). + Строка SDDL, на основании которой создается новый объект . + + + Получает значения, определяющие поведение объекта . + Один или несколько членов перечисления , объединенных с помощью операции логического ИЛИ. + + + Получает или задает список управления доступом на уровне пользователей для данного объекта .Список управления доступом на уровне пользователей содержит правила доступа. + Список управления доступом на уровне пользователей для данного объекта . + + + Получает или задает основную группу для данного объекта . + Основная группа для данного объекта . + + + Получает или задает владельца объекта, связанного с данным объектом . + Владелец объекта, связанного с данным объектом . + + + Получает или задает байтовое значение, которое представляет управляющие биты диспетчера ресурсов, связанные с данным объектом . + Байтовое значение, которое представляет управляющие биты диспетчера ресурсов, связанные с данным объектом . + + + Устанавливает указанное значение для свойства данного объекта . + Один или несколько членов перечисления , объединенных с помощью операции логического ИЛИ. + + + Получает или задает системный список управления доступом для данного объекта .Системный список управления доступом содержит правила аудита. + Системный список управления доступом для данного объекта . + + + Задает предварительно определенные собственные типы объектов. + + + Объект службы каталогов или набор свойств или свойство объекта службы каталогов. + + + Объект службы каталогов и все его наборы свойств и свойства. + + + Файл или каталог. + + + Локальный объект ядра. + + + Сетевая папка. + + + Принтер. + + + Объект, определенный поставщиком. + + + Раздел реестра. + + + Объект записи реестра в подсистеме WOW64. + + + Служба Windows. + + + Объект неизвестного типа. + + + Объект рабочей станции Windows на локальном компьютере. + + + Объект инструментария управления Windows (WMI) + + + Определяет раздел дескриптора безопасности для запроса или установки. + + + Список управления доступом на уровне пользователей. + + + Идентификатор основной группы. + + + Идентификатор владельца. + + + Системный список управления доступом. + + + Представляет системный список управления доступом. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Номер редакции нового объекта . + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Инициализирует новый экземпляр класса с использованием указанных значений. + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Количество элементов управления доступом, которые могут содержаться в данном объекте .Это число будет использоваться только для справки. + + + Инициализирует новый экземпляр класса с указанными значениями из указанного объекта . + Значение true, если новый объект является контейнером. + Значение true, если новый объект является объектом каталога списка управления доступом. + Базовый объект , соответствующий новому объекту .Чтобы создать пустой список управления доступом, укажите значение null. + + + Добавляет правило аудита к текущему объекту . + Тип добавляемого правила аудита. + Объект , для которого добавляется правило аудита. + Маска доступа для нового правила аудита. + Флаги, определяющие свойства наследования нового правила аудита. + Флаги, определяющие свойства распространения наследования нового правила аудита. + + + Добавляет правило аудита с указанными параметрами к текущему объекту .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта для нового правила аудита. + Тип добавляемого правила аудита. + Объект , для которого добавляется правило аудита. + Маска доступа для нового правила аудита. + Флаги, определяющие свойства наследования нового правила аудита. + Флаги, определяющие свойства распространения наследования нового правила аудита. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется новое правило аудита. + Идентификатор класса дочерних объектов, которые могут наследовать новое правило аудита. + + + Добавляет правило аудита к текущему объекту . + Объект , для которого добавляется правило аудита. + + Для нового правила аудита. + + + Удаляет указанное правило аудита из текущего объекта . + Значение true, если метод успешно удаляет указанное правило аудита; в противном случае — значение false. + Тип удаляемого правила аудита. + Объект , для которого удаляется правило аудита. + Маска доступа для удаляемого правила. + Флаги, определяющие свойства наследования удаляемого правила. + Флаги, определяющие свойства распространения наследования удаляемого правила. + + + Удаляет указанное правило аудита из текущего объекта .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта. + Значение true, если метод успешно удаляет указанное правило аудита; в противном случае — значение false. + Тип удаляемого правила аудита. + Объект , для которого удаляется правило аудита. + Маска доступа для удаляемого правила. + Флаги, определяющие свойства наследования удаляемого правила. + Флаги, определяющие свойства распространения наследования удаляемого правила. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется удаляемое правило аудита. + Идентификатор класса дочерних объектов, которые могут наследовать удаляемое правило аудита. + + + Удаляет указанное правило аудита из текущего объекта . + Значение true, если метод успешно удаляет указанное правило аудита; в противном случае — значение false. + Объект , для которого удаляется правило аудита. + Объект , для которого удаляется правило аудита. + + + Удаляет указанное правило аудита из текущего объекта . + Тип удаляемого правила аудита. + Объект , для которого удаляется правило аудита. + Маска доступа для удаляемого правила. + Флаги, определяющие свойства наследования удаляемого правила. + Флаги, определяющие свойства распространения наследования удаляемого правила. + + + Удаляет указанное правило аудита из текущего объекта .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта. + Тип удаляемого правила аудита. + Объект , для которого удаляется правило аудита. + Маска доступа для удаляемого правила. + Флаги, определяющие свойства наследования удаляемого правила. + Флаги, определяющие свойства распространения наследования удаляемого правила. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется удаляемое правило аудита. + Идентификатор класса дочерних объектов, которые могут наследовать удаляемое правило аудита. + + + Удаляет указанное правило аудита из текущего объекта . + Объект , для которого удаляется правило аудита. + + Для удаляемого правила. + + + Устанавливает указанное правило аудита для указанного объекта . + Устанавливаемое условие аудита. + Объект , для которого устанавливается правило аудита. + Маска доступа для нового правила аудита. + Флаги, определяющие свойства наследования нового правила аудита. + Флаги, определяющие свойства распространения наследования нового правила аудита. + + + Устанавливает указанное правило аудита для указанного объекта .Используйте этот метод для списков управления доступом объектов каталогов при указании типа объекта или типа наследуемого объекта. + Устанавливаемое условие аудита. + Объект , для которого устанавливается правило аудита. + Маска доступа для нового правила аудита. + Флаги, определяющие свойства наследования нового правила аудита. + Флаги, определяющие свойства распространения наследования нового правила аудита. + Флаги, определяющие, содержат ли параметры и значения, отличные от null. + Идентификатор класса объектов, к которым применяется новое правило аудита. + Идентификатор класса дочерних объектов, которые могут наследовать новое правило аудита. + + + Устанавливает указанное правило аудита для указанного объекта . + Объект , для которого устанавливается правило аудита. + Объект , для которого устанавливается правило аудита. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hans/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hans/System.Security.AccessControl.xml new file mode 100644 index 0000000..d5056f4 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hans/System.Security.AccessControl.xml @@ -0,0 +1,1994 @@ + + + + System.Security.AccessControl + + + + 指定对可保护对象允许的操作。 + + + 指定只写访问权限。 + + + 指定无访问权限。 + + + 指定只读访问权限。 + + + 指定要执行的访问控制修改的类型。此枚举由 类及其子类的方法使用。 + + + 将指定的授权规则添加到访问控制列表 (ACL)。 + + + 从 ACL 移除所含安全性标识符 (SID) 和访问掩码与指定授权规则一样的授权规则。 + + + 从 ACL 移除所含 SID 与指定授权规则一样的授权规则。 + + + 从 ACL 移除与指定的授权规则完全匹配的授权规则。 + + + 从 ACL 移除所含 SID 与指定授权规则一样的授权规则,然后将指定的授权规则添加到 ACL。 + + + 从 ACL 移除所有授权规则,然后将指定的授权规则添加到 ACL。 + + + 指定要保存或加载安全性说明符的哪些部分。 + + + 自由访问控制列表 (DACL)。 + + + 整个安全性说明符。 + + + 系统访问控制列表 (SACL)。 + + + 主要组。 + + + 不包括任何部分。 + + + 所有者。 + + + 指定是否使用 对象来允许或拒绝访问。这些值不是标志,不能组合它们。 + + + 使用 对象来允许访问受保护对象。 + + + 使用 对象来拒绝访问受保护对象。 + + + 表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。 对象还包含有关子对象如何继承规则以及如何传播继承的信息。 + + + 使用指定的值初始化 类的一个新实例。 + 应用访问规则的标识。此参数必须是可以强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 如果此规则继承自父容器,则为 true。 + 访问规则的继承属性。 + 继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 有效的访问控制类型。 + + 参数的值不能强制转换为 ,或者 参数包含无效值。 + + 参数的值为零,或者 参数包含无法识别的标志值。 + + + 获取与此 对象关联的 对象。 + 与此 对象关联的 对象。 + + + 表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。AccessRule`1 对象还包含有关子对象如何继承规则以及如何传播继承的信息。 + 访问规则的访问权限类型。 + + + 使用指定的值初始化 AccessRule’1 类的一个新实例。 + 应用访问规则的标识。 + 访问规则的权限。 + 有效的访问控制类型。 + + + 使用指定的值初始化 AccessRule’1 类的一个新实例。 + 应用访问规则的标识。 + 访问规则的权限。 + 访问规则的继承属性。 + 继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 有效的访问控制类型。 + + + 使用指定的值初始化 AccessRule’1 类的一个新实例。 + 应用访问规则的标识。 + 访问规则的权限。 + 有效的访问控制类型。 + + + 使用指定的值初始化 AccessRule’1 类的一个新实例。 + 应用访问规则的标识。 + 访问规则的权限。 + 访问规则的继承属性。 + 继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 有效的访问控制类型。 + + + 获取当前实例的权限。 + 当前实例的强制转换为类型 <T> 的权利。 + + + 提供遍历访问控制列表 (ACL) 中的访问控制项 (ACE) 的能力。 + + + 获取 集合中的当前元素。此属性获取对象的类型易于转换的版本。 + + 集合中的当前元素。 + + + 将枚举器前进到 集合的下一个元素。 + 如果枚举数成功地推进到下一个元素,则为 true;如果枚举数越过集合的结尾,则为 false。 + 在创建了枚举数后集合被修改了。 + + + 将枚举数设置为其初始位置,该位置位于 集合中第一个元素之前。 + 在创建了枚举数后集合被修改了。 + + + + 指定访问控制项 (ACE) 的继承和审核行为。 + + + 审核所有访问尝试。 + + + 将访问掩码传播到子容器对象。 + + + 审核失败的访问尝试。 + + + + 的逻辑 OR。 + + + 从父容器继承而不是为对象显式设置 ACE。 + + + 仅将访问掩码传播到子对象。这将包括容器子对象和子叶对象。 + + + 不设置任何 ACE 标志。 + + + 访问检查不适用于该对象;它们仅适用于其子对象。 + + + 将访问掩码传播到子叶对象上。 + + + 审核成功的访问尝试。 + + + 指定访问控制项 (ACE) 的功能。 + + + 允许访问。 + + + 拒绝访问。 + + + 导致系统警告。 + + + 导致系统审核。 + + + 定义可用的访问控制项 (ACE) 类型。 + + + 允许访问一个由 对象标识的特定受信者所对应的对象。 + + + 允许访问一个由 对象标识的特定受信者所对应的对象。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 允许访问对象、属性集或属性。ACE 包含一组访问权限、标识对象类型的 GUID 以及一个 对象,该对象标识了系统将向其授予访问权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 已定义但是从未使用。这里包括它是出于完整性的考虑。 + + + 允许访问对象、属性集或属性。ACE 包含一组访问权限、标识对象类型的 GUID 以及一个 对象,该对象标识了系统将向其授予访问权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。 + + + 拒绝访问一个由 对象标识的特定受信者所对应的对象。 + + + 拒绝访问一个由 对象标识的特定受信者所对应的对象。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 拒绝访问对象、属性集或属性。ACE 包含一组访问权限、标识对象类型的 GUID 以及一个 对象,该对象标识了系统将向其授予访问权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 拒绝访问对象、属性集或属性。ACE 包含一组访问权限、标识对象类型的 GUID 以及一个 对象,该对象标识了系统将向其授予访问权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。 + + + 跟踪枚举中定义的最大 ACE 类型。 + + + 保留供将来使用。 + + + 保留供将来使用。 + + + 保留供将来使用。 + + + 保留供将来使用。 + + + 导致当指定的受信者尝试获得对某个对象的访问权限时记录一条审核消息。受信者由一个 对象标识。 + + + 导致当指定的受信者尝试获得对某个对象的访问权限时记录一条审核消息。受信者由一个 对象标识。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 导致当指定的受信者尝试获得对某个对象或子对象(如属性集或属性)的访问权限时记录一条审核消息。ACE 包含一组访问权限、标识对象或子对象类型的 GUID 以及一个 对象,该对象标识了系统将审核其权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。这种 ACE 类型可包含可选的回调数据。回调数据是未经解释的资源管理器特定的 BLOB。 + + + 导致当指定的受信者尝试获得对某个对象或子对象(如属性集或属性)的访问权限时记录一条审核消息。ACE 包含一组访问权限、标识对象或子对象类型的 GUID 以及一个 对象,该对象标识了系统将审核其权限的受信者。ACE 还包含一个 GUID 和一组标志,这些标志控制子对象对 ACE 的继承。 + + + 指定用于审核对可保护对象的访问尝试的条件。 + + + 将审核失败的访问尝试。 + + + 将不审核任何访问尝试。 + + + 将审核成功的访问尝试。 + + + 表示用户的标识和访问掩码的组合。 对象还包含有关子对象如何继承规则、继承如何传播以及规则的审核条件是什么的信息。 + + + 使用指定的值初始化 类的一个新实例。 + 审核规则应用到的标识。它必须是可强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 若从父容器继承此规则,则为 true。 + 审核规则的继承属性。 + 继承的审核规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 审核规则的条件。 + + 参数的值不能强制转换为 ,否则 参数包含无效值。 + + 参数的值为零,或者 参数包含无法识别的标志值。 + + + 获取此审核规则的审核标志。 + 枚举值的按位组合。此组合为此审核规则指定审核条件。 + + + 表示用户的标识和访问掩码的组合。 + + + + 使用指定的值初始化 AuditRule’1 类的一个新实例。 + 审核规则应用到的标识。 + 审核规则的权限。 + 审核规则的条件。 + + + 使用指定的值初始化 AuditRule’1 类的一个新实例。 + 审核规则应用到的标识。 + 审核规则的权限。 + 审核规则的继承属性。 + 继承的审核规则是否自动传播。 + 审核规则的条件。 + + + 使用指定的值初始化 AuditRule’1 类的一个新实例。 + 审核规则应用到的标识。 + 审核规则的权限。 + 审核规则的属性。 + + + 使用指定的值初始化 AuditRule’1 类的一个新实例。 + 审核规则应用到的标识。 + 审核规则的权限。 + 审核规则的继承属性。 + 继承的审核规则是否自动传播。 + 审核规则的条件。 + + + 审核规则的权限。 + 返回 + + + 确定对可保护对象的访问权限。派生类 提供了用于访问功能和审核功能的规范。 + + + 使用指定的值初始化 类的一个新实例。 + 应用访问规则的标识。此参数必须是可以强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 若从父容器继承此规则,则为 true。 + 访问规则的继承属性。 + 继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + + 参数的值不能强制转换为 + + 参数的值为零,或者 参数包含无法识别的标志值。 + + + 获取此规则的访问掩码。 + 此规则的访问掩码。 + + + 获取此规则应用到的 + 此规则应用到的 + + + 获取确定子对象如何继承此规则的标志值。 + 枚举值的按位组合。 + + + 获取指示此规则是显式设置的还是从父容器对象继承的值。 + 如果此规则不是显式设置的,而是从父容器继承的,则为 true。 + + + 获取传播标志的值,该值确定如何将此规则的继承传播到子对象。仅当 枚举的值不为 ,此属性才有意义。 + 枚举值的按位组合。 + + + 表示 对象集合。 + + + 初始化 类的新实例。 + + + 将一个 对象添加到集合中。 + 要添加到集合的 对象。 + + + 将该集合的内容复制到数组。 + 将集合内容复制到的目标数组。 + 从零开始的索引,从此处开始复制。 + + + + 获取集合中指定索引位置的 对象。 + 位于指定索引处的 对象。 + 要获取的 对象的从零开始的索引。 + + + + + + + 表示一个访问控制项 (ACE)。 + + + 初始化 类的新实例。 + 为新的访问控制项 (ACE) 指定有关继承、继承传播和审核条件的信息的标志。 + 新的 ACE 的使用情况。 + ACE 的访问掩码。 + 与新的 ACE 关联的 。 + 设置为 true 则指定新的 ACE 为回调类型的 ACE。 + 与新的 ACE 关联的不透明数据。只有回调 ACE 类型才允许不透明数据。此数组的长度一定不能大于 方法的返回值。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。将此长度用于 方法,以便将 ACL 封送到二进制数组中。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 对象的内容从指定的偏移量开始封送到指定的字节数组中。 + 对象的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 数组。 + + + 获取回调访问控制项 (ACE) 的不透明数据 BLOB 的最大允许长度。 + 不透明数据 BLOB 的允许长度。 + 设置为 true 则指定 对象为回调 ACE 类型。 + + + 表示访问控制列表 (ACL),并且是 类的基类。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。应该在使用 方法将访问控制列表封送到二进制数组中之前使用此长度。 + 获取当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 获取当前 对象中访问控制项 (ACE) 的数量。 + 当前 对象中 ACE 的数量。 + + + 对象的内容从指定的偏移量开始封送到指定的字节数组中。 + + 的内容将被封送到的字节数组。 + 开始封送的偏移量。 + + + 获取一个布尔值,该值指定当前 对象中的访问控制项 (ACE) 是否处于规范顺序。 + 如果当前 对象中的 ACE 处于规范顺序,则为 true;否则为 false。 + + + 设置 对象是否为一个容器。 + 如果当前 对象是一个容器,则为 true。 + + + 设置当前 对象是否为一个目录对象的访问控制列表 (ACL)。 + 如果当前 对象是一个目录对象的 ACL,则为 true。 + + + 获取或设置指定索引处的 + 位于指定索引处的 + 要获取或设置的 的从零开始的索引。 + + + 移除被此 对象包含并且与指定的 对象关联的所有访问控制项 (ACE)。 + 要检查的 对象。 + + + 从此 对象移除所有继承的访问控制项 (ACE)。 + + + 获取 的修订级别。 + 一个指定 的修订级别的字节值。 + + + 无需直接操作访问控制列表 (ACL) 而控制对对象的访问。此类是 类的抽象基类。 + + + 初始化 类的新实例。 + 如果新对象是一个容器对象,则为 true。 + + + 将指定的访问规则添加到与此 对象关联的自由访问控制列表 (DACL)。 + 要添加的访问规则。 + + + 将指定的审核规则添加到与该 对象关联的系统访问控制列表 (SACL)。 + 要添加的审核规则。 + + + 获取与指定的安全性标识符关联的访问规则的集合。 + 与指定的 对象关联的访问规则的集合。 + 若要包括为对象显式设置的访问规则,则为 true。 + 若要包括继承的访问规则,则为 true。 + 指定要为其检索访问规则的安全标识符是属于 T:System.Security.Principal.SecurityIdentifier 类型,还是属于 T:System.Security.Principal.NTAccount 类型。此参数的值所隶属的类型必须要能转换为 类型。 + + + + + + 获取与指定的安全性标识符关联的审核规则的集合。 + 与指定的 对象关联的审核规则的集合。 + 若要包括为对象显式设置的审核规则,则为 true。 + 若要包括继承的审核规则,则为 true。 + 要为其检索审核规则的安全性标识符。这必须是可以强制转换为 对象的对象。 + + + + + + 将指定修改应用于与此 对象关联的自由访问控制列表 (DACL)。 + 如果成功修改了 DACL,则为 true;否则为 false。 + 要应用于 DACL 的修改。 + 要修改的访问规则。 + 如果成功修改了 DACL,则为 true;否则为 false。 + + + 将指定修改应用于与此 对象关联的系统访问控制列表 (SACL)。 + 如果成功修改了 SACL,则为 true;否则为 false。 + 要应用于 SACL 的修改。 + 要修改的审核规则。 + 如果成功修改了 SACL,则为 true;否则为 false。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全性标识符和访问掩码的访问规则。 + 如果访问规则已成功移除,则为 true;否则为 false。 + 要移除的访问规则。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全性标识符的所有访问规则。 + 要移除的访问规则。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则完全匹配的所有访问规则。 + 要移除的访问规则。 + + + 从与此 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同安全性标识符和访问掩码的审核规则。 + 如果审核规则已成功移除,则为 true;否则为 false。 + 要移除的审核规则。 + + + 从与此 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同安全性标识符的所有审核规则。 + 要移除的审核规则。 + + + 从与此 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则完全匹配的所有审核规则。 + 要移除的审核规则。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除所有访问规则,然后添加指定的访问规则。 + 要重置的访问规则。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全性标识符和限定符的所有访问规则,然后添加指定的访问规则。 + 要设置的访问规则。 + + + 从与此 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同的安全性标识符和限定符所有审核规则,然后添加指定的审核规则。 + 要设置的审核规则。 + + + 表示安全性说明符。安全性说明符包含所有者、主要组、自由访问控制列表 (DACL) 和系统访问控制列表 (SACL)。 + + + 使用指定的字节值数组初始化 类的新实例。 + 如果新的安全性说明符与某个容器对象关联,则为 true。 + 如果新的安全性说明符与某个目录对象关联,则为 true。 + 用于创建新的 对象的字节值数组。 + + 数组中的偏移量,在此位置开始复制。 + + + 使用指定信息初始化 类的新实例。 + 如果新的安全性说明符与某个容器对象关联,则为 true。 + 如果新的安全性说明符与某个目录对象关联,则为 true。 + 指定新的 对象的行为的标志。 + 对象的所有者。 + 对象的主要组。 + 新的 对象的系统访问控制列表 (SACL)。 + 新的 对象的自由访问控制列表 (DACL)。 + + + 从指定的 对象初始化 类的新实例。 + 如果新的安全性说明符与某个容器对象关联,则为 true。 + 如果新的安全性说明符与某个目录对象关联,则为 true。 + 用来从中创建新 对象的 对象。 + + + 使用指定的安全性说明符定义语言 (SDDL) 字符串初始化 类的新实例。 + 如果新的安全性说明符与某个容器对象关联,则为 true。 + 如果新的安全性说明符与某个目录对象关联,则为 true。 + 用于创建新 对象的 SDDL 字符串。 + + + 设置为此属性实例并设置标志。 + 新的 对象的修订级别。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 设置为此属性实例并设置标志。 + 新的 对象的修订级别。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 获取指定 对象的行为的值。 + 使用逻辑或运算组合的一个或多个 枚举值。 + + + 获取或设置此 对象的自由访问控制列表 (DACL)。DACL 包含访问规则。 + 对象的 DACL。 + + + 获取或设置此 对象的主要组。 + 对象的主要组。 + + + 获取一个布尔值,该值指定与此 对象关联的对象是否为容器对象。 + 如果与此 对象关联的对象是一个容器对象,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的自由访问控制列表 (DACL) 是否按规范顺序。 + 如果与此 对象关联的 DACL 处于规范顺序,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的对象是否为目录对象。 + 如果与此 对象关联的对象是一个目录对象,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的系统访问控制列表 (SACL) 是否按规范顺序。 + 如果与此 对象关联的 SACL 处于规范顺序,则为 true;否则为 false。 + + + 获取或设置与此 对象关联的对象所有者。 + 与此 对象关联的对象所有者。 + + + 从与此 对象关联的自由访问控制列表 (DACL) 中移除指定的安全性标识符的所有访问规则。 + 要为其移除访问规则的安全性标识符。 + + + 从与此 对象关联的系统访问控制列表 (SACL) 中移除指定的安全性标识符的所有审核规则。 + 要为其移除审核规则的安全性标识符。 + + + 为与此 对象关联的自由访问控制列表 (DACL) 设置继承保护。受保护的 DACL 不会从父容器继承访问规则。 + 若要保护 DACL 不被继承,则为 true。 + 若要在 DACL 中保留继承的访问规则,则为 true;若要从 DACL 中移除继承的访问规则,则为 false。 + + + 为与此 对象关联的系统访问控制列表 (SACL) 设置继承保护。受保护的 SACL 不会从父容器继承审核规则。 + 若要保护 SACL 不被继承,则为 true。 + 若要在 SACL 中保留继承的审核规则,则为 true;若要从 SACL 中移除继承的审核规则,则为 false。 + + + 获取或设置此 对象的系统访问控制列表 (SACL)。SACL 包含审核规则。 + 对象的 SACL。 + + + 表示复合访问控制项 (ACE)。 + + + 初始化 类的新实例。 + 包含标志,这些标志为新的访问控制项 (ACE) 指定有关继承、继承传播和审核条件的信息。 + ACE 的访问掩码。 + + 枚举中的一个值。 + 与新的 ACE 关联的 。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 获取或设置此 对象的类型。 + 对象的类型。 + + + 对象的内容封送到指定字节数组中,其位置从指定的偏移量开始。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 指定 对象的类型。 + + + + 对象用于模拟。 + + + 这些标志将影响安全性说明符的行为。 + + + 指定已自动从父级继承自由访问控制列表 (DACL)。仅由资源管理器设置。 + + + 已忽略。 + + + 指定 DACL 是通过默认设置机制获得的。仅由资源管理器设置。 + + + 指定 DACL 不为 null。由资源管理器或用户设置。 + + + 指定资源管理器阻止自动继承。由资源管理器或用户设置。 + + + 已忽略。 + + + 指定组 是通过默认设置机制获得的。仅由资源管理器设置;不应由调用方设置。 + + + 无控制标志。 + + + 指定所有者 是通过默认设置机制获得的。仅由资源管理器设置;不应由调用方设置。 + + + 指定“保留”(Reserved) 字段的内容是有效的。 + + + 指定安全性说明符二进制表示形式是自相关格式的。总是设置此标志。 + + + 已忽略。 + + + 指定已自动从父级继承系统访问控制列表 (SACL)。仅由资源管理器设置。 + + + 已忽略。 + + + 指定 SACL 是通过默认设置机制获得的。仅由资源管理器设置。 + + + 指定 SACL 不为 null。由资源管理器或用户设置。 + + + 指定资源管理器阻止自动继承。由资源管理器或用户设置。 + + + 表示未由 枚举的成员之一定义的访问控制项 (ACE)。 + + + 初始化 类的新实例。 + 新的访问控制项 (ACE) 的类型。该值必须大于 。 + 为新的 ACE 指定有关继承、继承传播和审核条件的信息的标志。 + 一个包含新的 ACE 的数据的字节值数组。此值可为 null。此数组的长度一定不能大于 字段的值,并且必须是四的倍数。 + + 参数的值不大于 ,或者 数组的长度大于 字段的值或不是四的倍数。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 对象的内容封送到指定字节数组中,其位置从指定的偏移量开始。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 返回与此 对象关联的不透明数据。 + 一个字节值数组,表示与此 对象关联的不透明数据。 + + + 返回此 对象的不透明数据 Blob 的最大允许长度。 + + + 获取与此 对象关联的不透明数据的长度。 + 不透明回调数据的长度。 + + + 设置与此 对象关联的不透明回调数据。 + 一个字节值数组,表示此 对象的不透明回调数据。 + + + 表示自由访问控制列表 (DACL)。 + + + 用指定的值初始化 类的新实例。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 新的 对象的修订级别。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 用指定的值初始化 类的新实例。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 使用指定的 对象中的指定值初始化 类的新实例。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object.指定 null 以创建空的 ACL。 + + + 将具有指定设置的访问控制项 (ACE) 添加到当前 对象。 + 要添加的访问控制类型(允许或拒绝)。 + 要为其添加 ACE 的 。 + 新 ACE 的访问规则。 + 指定新 ACE 的继承属性的标志。 + 指定新 ACE 的继承传播属性的标志。 + + + 将具有指定设置的访问控制项 (ACE) 添加到当前 对象。在指定新 ACE 的对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 要添加的访问控制类型(允许或拒绝)。 + 要为其添加 ACE 的 。 + 新 ACE 的访问规则。 + 指定新 ACE 的继承属性的标志。 + 指定新 ACE 的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 新 ACE 所应用到的对象的类标识。 + 可以继承新 ACE 的子对象的类标识。 + + + 将具有指定设置的访问控制项 (ACE) 添加到当前 对象。 + 要添加的访问控制类型(允许或拒绝)。 + 要为其添加 ACE 的 。 + + 为新的访问。 + + + 从当前 对象移除指定的访问控制规则。 + 如果此方法成功移除指定的访问控制规则,则为 true;否则为 false。 + 要移除的访问控制类型(允许或拒绝)。 + 要移除其访问控制规则的 。 + 要移除的规则的访问掩码。 + 指定要移除的规则的继承属性的标志。 + 指定要移除的规则的继承传播属性的标志。 + + + 从当前 对象移除指定的访问控制规则。在指定对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 如果此方法成功移除指定的访问控制规则,则为 true;否则为 false。 + 要移除的访问控制类型(允许或拒绝)。 + 要移除其访问控制规则的 。 + 要移除的访问控制规则的访问掩码。 + 指定要移除的访问控制规则的继承属性的标志。 + 指定要移除的访问控制规则的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 移除的访问控制规则所应用到的对象的类标识。 + 可以继承移除的访问控制规则的子对象的类标识。 + + + 从当前 对象移除指定的访问控制规则。 + 返回 + 要移除的访问控制类型(允许或拒绝)。 + 要移除其访问控制规则的 。 + + 为其删除的访问权限。 + + + 从当前 对象移除指定的访问控制项 (ACE)。 + 要移除的访问控制类型(允许或拒绝)。 + 要为其移除 ACE 的 。 + 要移除的 ACE 的访问掩码。 + 指定要移除的 ACE 的继承属性的标志。 + 指定要移除的 ACE 的继承传播属性的标志。 + + + 从当前 对象移除指定的访问控制项 (ACE)。在指定要移除的 ACE 的对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 要移除的访问控制类型(允许或拒绝)。 + 要为其移除 ACE 的 。 + 要移除的 ACE 的访问掩码。 + 指定要移除的 ACE 的继承属性的标志。 + 指定要移除的 ACE 的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 移除的 ACE 所应用到的对象的类标识。 + 可以继承移除的 ACE 的子对象的类标识。 + + + 从当前 对象移除指定的访问控制项 (ACE)。 + 要移除的访问控制类型(允许或拒绝)。 + 要为其移除 ACE 的 。 + + 为其删除的访问权限。 + + + 为指定的 对象设置指定的访问控制。 + 要设置的访问控制类型(允许或拒绝)。 + 要为其设置 ACE 的 。 + 新 ACE 的访问规则。 + 指定新 ACE 的继承属性的标志。 + 指定新 ACE 的继承传播属性的标志。 + + + 为指定的 对象设置指定的访问控制。 + 要设置的访问控制类型(允许或拒绝)。 + 要为其设置 ACE 的 。 + 新 ACE 的访问规则。 + 指定新 ACE 的继承属性的标志。 + 指定新 ACE 的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 新 ACE 所应用到的对象的类标识。 + 可以继承新 ACE 的子对象的类标识。 + + + 为指定的 对象设置指定的访问控制。 + 要设置的访问控制类型(允许或拒绝)。 + 要为其设置 ACE 的 。 + + 为其设置访问权限。 + + + 表示一个访问控制项 (ACE),并且是其他所有 ACE 类的基类。 + + + 获取或设置与此 对象关联的 对象。 + 与此 对象关联的 + + + 获取此访问控制项 (ACE) 的类型。 + 此 ACE 的类型。 + + + 获取与此访问控制项 (ACE) 关联的审核信息。 + 与此访问控制项 (ACE) 关联的审核信息。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 创建此访问控制项 (ACE) 的深层副本。 + 此方法所创建的 对象。 + + + 从指定的二进制数据创建一个 对象。 + 此方法创建的 对象。 + 用于创建新 对象的二进制数据。 + 开始取消封送的偏移量。 + + + 确定指定的 对象是否等同于当前的 + 如果指定的 对象等于当前的 对象,则为 true;否则为 false。 + 要与当前 对象进行比较的 对象。 + + + 对象的内容封送到指定字节数组中,其位置从指定的偏移量开始。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 用于 类的一个哈希函数。 方法适合在哈希算法和类似哈希表的数据结构中使用。 + 当前 对象的哈希代码。 + + + 获取指定此访问控制项 (ACE) 的继承属性的标志。 + 指定此 ACE 的继承属性的标志。 + + + 获取一个布尔值,该值指定此访问控制项 (ACE) 是继承的还是显式设置的。 + 如果此 ACE 是继承的,则为 true;否则,为 false。 + + + 确定指定的 对象是否被视为相等。 + 如果两个 对象相等,则为 true;否则为 false。 + 要比较的第一个 对象。 + 要比较的第二个 。 + + + 确定指定的 对象是否被视为不相等。 + 如果两个 对象不相等,则为 true;否则,为 false。 + 要比较的第一个 对象。 + 要比较的第二个 。 + + + 获取指定此访问控制项 (ACE) 的继承传播属性的标志。 + 指定此 ACE 的继承传播属性的标志。 + + + 表示访问控制列表 (ACL),并且是 类的基类。 + + + 初始化 类的新实例。 + + + 当前 的修订级别。此值由未与目录服务对象关联的访问控制列表 (ACL) 的 属性返回。 + + + 当前 的修订级别。此值由与目录服务对象关联的访问控制列表 (ACL) 的 属性返回。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 将当前 的每个 复制到指定的数组中。 + 存放当前 包含的 对象的副本的数组。 + + 中从零开始的索引,这是开始复制的位置。 + + + 获取当前 对象中访问控制项 (ACE) 的数量。 + 当前 对象中 ACE 的数量。 + + + 对象的内容封送到指定字节数组中,其位置从指定的偏移量开始。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 返回 类的新实例。 + 此方法返回的 + + + 此属性始终设置为 false。实现此属性只是因为它是 接口的实现所必需的属性。 + 始终为 false。 + + + 获取或设置指定索引处的 + 位于指定索引处的 + 要获取或设置的 的从零开始的索引。 + + + + 对象的最大允许二进制长度。 + + + 获取 的修订级别。 + 一个指定 的修订级别的字节值。 + + + 该属性始终返回 null。实现此属性只是因为它是 接口的实现所必需的属性。 + 始终返回 null。 + + + 将当前 的每个 复制到指定的数组中。 + 存放当前 包含的 对象的副本的数组。 + + 中从零开始的索引,这是开始复制的位置。 + + + 返回 类的新实例,该实例被强制转换为 接口的实例。 + 一个新 对象,该对象被强制转换为 接口的实例。 + + + 表示安全性说明符。安全性说明符包含所有者、主要组、自由访问控制列表 (DACL) 和系统访问控制列表 (SACL)。 + + + 初始化 类的新实例。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 获取指定 对象的行为的值。 + 使用逻辑或运算组合的一个或多个 枚举值。 + + + 返回一个表示此 对象中包含的信息的字节值数组。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 返回此 对象表示的安全性说明符指定区域的安全说明符定义语言 (SDDL) 表示形式。 + 与此 对象关联的安全性说明符指定部分的 SDDL 表示形式。 + 指定要获取安全性说明符的哪些部分(访问规则、审核规则、主要组、所有者)。 + + + 获取或设置此 对象的主要组。 + 对象的主要组。 + + + 返回一个布尔值,该值指定与此 对象关联的安全性说明符是否能够转换为安全性说明符定义语言 (SDDL) 格式。 + 如果与此 对象关联的安全性说明符能够转换为安全性说明符定义语言 (SDDL) 格式,则为 true;否则为 false。 + + + 获取或设置与此 对象关联的对象所有者。 + 与此 对象关联的对象所有者。 + + + 获取 对象的修订级别。 + 一个指定 的修订级别的字节值。 + + + 继承标志指定访问控制项 (ACE) 的继承语义。 + + + ACE 由容器子对象继承。 + + + 子对象未继承 ACE。 + + + ACE 由子叶对象继承。 + + + 封装 Microsoft Corporation 当前定义的所有访问控制项 (ACE) 类型。所有 对象都包含一个 32 位的访问掩码和一个 对象。 + + + 获取或设置此 对象的访问掩码。 + 对象的访问掩码。 + + + 获取或设置与此 对象关联的 对象。 + 与此 对象关联的 对象。 + + + 提供无需直接操作访问控制列表 (ACL) 而控制对本机对象的访问的能力。本机对象类型由 枚举定义。 + + + 用指定的值初始化 类的新实例。 + 如果新的 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + + + 用指定的值初始化 类的新实例。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 如果新的 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + 新的 对象与其相关联的可保护对象的句柄。 + + 枚举值之一,指定要包括在此 对象中的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + + + 用指定的值初始化 类的新实例。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 如果新的 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + 新的 对象与其相关联的可保护对象的句柄。 + + 枚举值之一,指定要包括在此 对象中的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 由提供自定义异常的集成器实现的委托。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 使用指定的值初始化 类的一个新实例。 + 如果新的 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + 由提供自定义异常的集成器实现的委托。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 用指定的值初始化 类的新实例。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 如果新 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + 新的 对象与其相关联的可保护对象的名称。 + + 枚举值之一,指定要包括在此 对象中的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + + + 用指定的值初始化 类的新实例。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 如果新的 对象是一个容器对象,则为 true。 + + 对象与其相关联的可保护对象类型。 + 新的 对象与其相关联的可保护对象的名称。 + + 枚举值之一,指定要包括在此 对象中的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 由提供自定义异常的集成器实现的委托。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 对象与其相关联的可保护对象的句柄。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 对象与之关联的可保护对象是一个目录或一个文件,且该目录或文件未能找到。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 对象与其相关联的可保护对象的句柄。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 包含有关异常的源或目标的上下文信息的对象。 + 对象与之关联的可保护对象是一个目录或一个文件,且该目录或文件未能找到。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 对象与其相关联的可保护对象的名称。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 对象与之关联的可保护对象是一个目录或一个文件,且该目录或文件未能找到。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 对象与其相关联的可保护对象的名称。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + 包含有关异常的源或目标的上下文信息的对象。 + 对象与之关联的可保护对象是一个目录或一个文件,且该目录或文件未能找到。 + + + 为集成器提供一种将数字错误代码映射到它们创建的特定异常的方式。 + 此委托创建的 + 数字错误代码。 + + 对象所关联的可保护对象的名称。 + + 对象所关联的可保护对象的句柄。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。 对象还包含与以下内容有关的信息:应用规则的对象的类型、能够继承规则的子对象的类型、子对象继承该规则的方式以及继承的传播方式。 + + + 用指定的值初始化 类的新实例。 + 应用访问规则的标识。它必须是可强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 如果此规则继承自父容器,则为 true。 + 指定访问规则的继承属性。 + 指定继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 应用此规则的对象的类型。 + 能够继承此规则的子对象的类型。 + 指定此规则是允许还是拒绝访问。 + + 参数的值不能强制转换为 ,或者 参数包含无效值。 + + 参数的值为零,或者 参数包含无法识别的标志值。 + + + 获取能够继承 对象的子对象的类型。 + 能够继承 对象的子对象的类型。 + + + 获取指定 对象的 属性是否包含有效值的标志。 + + 指定 属性包含有效值。 指定 属性包含有效值。这些值可以使用逻辑或运算进行组合。 + + + 获取应用 的对象的类型。 + 应用 的对象的类型。 + + + 控制对目录服务对象的访问。此类表示与某个目录对象关联的访问控制项 (ACE)。 + + + 初始化 类的新实例。 + 新的访问控制项 (ACE) 的继承、继承传播和审核条件。 + 使用新的 ACE。 + ACE 的访问掩码。 + 与新的 ACE 关联的 。 + + 参数是否包含有效的对象 GUID。 + 一个 GUID,标识新的 ACE 所应用到的对象类型。 + 一个 GUID,标识能够继承新的 ACE 的对象类型。 + 如果新的 ACE 是回调类型的 ACE,则为 true。 + 与新的 ACE 关联的不透明数据。只有回调 ACE 类型才允许不透明数据。此数组的长度一定不能大于 方法的返回值。 + qualifier 参数包含无效的值,或者不透明参数的值的长度大于 方法的返回值。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 对象的内容从指定的偏移量开始封送到指定的字节数组中。 + + 的内容将被封送到的字节数组。 + 开始封送的偏移量。 + + 如果值为负数或过高,则会将整个 复制到 + + + 获取或设置对象类型的 GUID,该对象类型能够继承此 对象所表示的访问控制项 (ACE)。 + 对象类型的 GUID,该对象类型能够继承此 对象所表示的访问控制项 (ACE)。 + + + 返回回调访问控制项 (ACE) 的不透明数据 BLOB 的最大允许长度(以字节为单位)。 + 回调访问控制项 (ACE) 的不透明数据 BLOB 的最大允许长度(以字节为单位)。 + 如果 为回调 ACE 类型,则为 true。 + + + 获取或设置标志,这些标志指定了 属性是否包含用于标识有效对象类型的值。 + 使用逻辑或运算进行组合的一个或多个 枚举成员。 + + + 获取或设置与此 对象关联的对象类型的 GUID。 + 与此 对象关联的对象类型的 GUID。 + + + 指定访问控制项 (ACE) 的对象类型的存在性。 + + + 可继承 ACE 的对象的类型。 + + + 不存在任何对象类型。 + + + 存在与 ACE 关联的对象类型。 + + + 表示用户的标识、访问掩码和审核条件的组合。 对象还包含有关规则所应用到的对象的类型、能够继承规则的子对象的类型、子对象如何继承该规则以及继承如何传播的信息。 + + + 初始化 类的新实例。 + 应用访问规则的标识。它必须是可强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 如果此规则继承自父容器,则为 true。 + 指定访问规则的继承属性。 + 继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 应用此规则的对象的类型。 + 能够继承此规则的子对象的类型。 + 审核条件。 + + 参数的值不能强制转换为 ,或者 参数包含无效值。 + + 参数的值为零,或者 参数包含无法识别的标志值。 + + + 获取能够继承 对象的子对象的类型。 + 能够继承 对象的子对象的类型。 + + + + 对象的 属性包含有效值。 + + 指定 属性包含有效值。 指定 属性包含有效值。这些值可以使用逻辑或运算进行组合。 + + + 获取 所应用到的对象的类型。 + + 所应用到的对象的类型。 + + + 提供在无需直接操作访问控制列表 (ACL) 的情况下控制对象访问的能力。此类为 类的抽象基类。 + + + 初始化 类的新实例。 + + + 初始化 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 如果新 对象是一个目录对象,则为 true。 + + + 初始化 类的新实例。 + 新的 实例的 。 + + + Gets the of the securable object associated with this object. + 与此 对象关联的可保护对象的类型。 + + + 用指定的值初始化 类的新实例。 + 此方法所创建的 对象。 + 应用访问规则的标识。它必须是可强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 如果此规则继承自父容器,则为 true。 + 指定访问规则的继承属性。 + 指定继承的访问规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 指定有效的访问控制类型。 + + + 获取或设置一个布尔值,该值指定与此 对象关联的访问规则是否已被修改。 + 如果与此 对象关联的访问规则已被修改,则为 true;否则为 false。 + + + Gets the of the object associated with the access rules of this object. 对象必须是可以强制转换为 对象的对象。 + 与此 对象的访问规则关联的对象的类型。 + + + 获取一个布尔值,该值指定与此 对象关联的访问规则是否处于规范顺序。 + 如果访问规则处于规范顺序,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的自由访问控制列表 (DACL) 是否受到保护。 + 如果 DACL 受到保护,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的审核规则是否处于规范顺序。 + 如果审核规则处于规范顺序,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定与此 对象关联的系统访问控制列表 (SACL) 是否受到保护。 + 如果 SACL 受到保护,则为 true;否则为 false。 + + + 用指定的值初始化 类的新实例。 + 此方法所创建的 对象。 + 审核规则应用到的标识。它必须是可强制转换为 的对象。 + 此规则的访问掩码。访问掩码是一个 32 位的匿名位集合,其含义是由每个集成器定义的。 + 如果此规则继承自父容器,则为 true。 + 指定审核规则的继承属性。 + 指定继承的审核规则是否自动传播。如果 设置为 ,则将忽略传播标志。 + 指定对规则进行审核的条件。 + + + 获取或设置一个布尔值,该值指定与此 对象关联的审核规则是否已被修改。 + 如果与此 对象关联的审核规则已被修改,则为 true;否则为 false。 + + + Gets the object associated with the audit rules of this object. 对象必须是可以强制转换为 对象的对象。 + 与此 对象的审核规则关联的对象的类型。 + + + 获取与指定的所有者关联的主要组。 + 与指定的所有者关联的主要组。 + 要获取其主要组的所有者。 + + + + + + 获取与指定的主要组关联的所有者。 + 与指定的组关联的所有者。 + 要获取其所有者的主要组。 + + + + + + 返回一个字节值数组,表示此 对象的安全说明符信息。 + 一个字节值数组,表示此 对象的安全说明符。如果此 对象中没有安全性信息,则此方法返回 null。 + + + 返回与此 对象关联的安全说明符指定部分的安全说明符定义语言 (SDDL) 表示形式。 + 与此 对象关联的安全说明符指定部分的 SDDL 表示形式。 + 指定要获取安全性说明符的哪些部分(访问规则、审核规则、主要组、所有者)。 + + + 获取或设置一个布尔值,该值指定与可保护对象关联的组是否已被修改。 + 如果与可保护对象关联的组已被修改,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定此 对象是否是一个容器对象。 + 如果 对象是一个容器对象,则为 true;否则为 false。 + + + 获取一个布尔值,该值指定此 对象是否是一个目录对象。 + 如果 对象是一个目录对象,则为 true;否则为 false。 + + + 返回一个布尔值,该值指定与此 对象关联的安全说明符是否能够转换为安全说明符定义语言 (SDDL) 格式。 + 如果与此 对象关联的安全性说明符能够转换为安全性说明符定义语言 (SDDL) 格式,则为 true;否则为 false。 + + + 将指定修改应用于与此 对象关联的自由访问控制列表 (DACL)。 + 如果成功修改了 DACL,则为 true;否则为 false。 + 要应用于 DACL 的修改。 + 要修改的访问规则。 + 如果成功修改了 DACL,则为 true;否则为 false。 + + + 将指定修改应用于与此 对象关联的自由访问控制列表 (DACL)。 + 如果成功修改了 DACL,则为 true;否则为 false。 + 要应用于 DACL 的修改。 + 要修改的访问规则。 + 如果成功修改了 DACL,则为 true;否则为 false。 + + + 将指定修改应用于与此 对象关联的系统访问控制列表 (SACL)。 + 如果成功修改了 SACL,则为 true;否则为 false。 + 要应用于 SACL 的修改。 + 要修改的审核规则。 + 如果成功修改了 SACL,则为 true;否则为 false。 + + + 将指定修改应用于与此 对象关联的系统访问控制列表 (SACL)。 + 如果成功修改了 SACL,则为 true;否则为 false。 + 要应用于 SACL 的修改。 + 要修改的审核规则。 + 如果成功修改了 SACL,则为 true;否则为 false。 + + + 获取或设置一个布尔值,该值指定可保护对象的所有者是否已被修改。 + 如果可保护对象的所有者已被修改,则为 true;否则为 false。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 若要启用允许调用方取得对象所有权的特权,则为 true。 + 用于检索保持的信息的名称。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 用于检索保持的信息的句柄。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + + + 将与此 对象关联的安全说明符的指定部分保存到永久性存储。建议传递给构造函数和 Persist 方法的 参数的值应该相同。有关更多信息,请参见“备注”。 + 用于检索保持的信息的名称。 + + 枚举值之一,指定要保存的可保护对象的安全说明符(访问规则、审核规则、所有者和主要组)的各个部分。 + + + 移除与指定的 关联的所有访问规则。 + 要移除其所有访问规则的 。 + 所有访问规则的顺序都不规范。 + + + 移除与指定的 关联的所有审核规则。 + 要移除其审核规则的 。 + 所有审核规则的顺序都不规范。 + + + 锁定此 对象以进行读访问。 + + + 取消此 对象的锁定以进行读访问。 + + + 设置或移除与此 对象关联的访问规则的保护。受保护的访问规则不会通过继承被父对象修改。 + 要防止与此 对象关联的访问规则被继承,则为 true;要允许继承,则为 false。 + 要保留继承的访问规则,则为 true;要移除继承的访问规则,则为 false。如果 为 false,则忽略此参数。 + 此方法尝试从非规范的自由访问控制列表 (DACL) 移除继承的规则。 + + + 设置或移除与此 对象关联的审核规则的保护。受保护的审核规则不会通过继承被父对象修改。 + 要防止与此 对象关联的审核规则被继承,则为 true;要允许继承,则为 false。 + 要保留继承的审核规则,则为 true;要移除继承的审核规则,则为 false。如果 为 false,则忽略此参数。 + 此方法尝试从非规范的系统访问控制列表 (SACL) 移除继承的规则。 + + + 设置与此 对象关联的安全说明符的主要组。 + 要设置的主要组。 + + + 设置与此 对象关联的安全说明符的所有者。 + 要设置的所有者。 + + + 根据指定的字节值数组设置此 对象的安全说明符。 + 用于设置安全说明符的字节数组。 + + + 根据指定的字节值数组设置此 对象的安全说明符中的指定部分。 + 用于设置安全说明符的字节数组。 + 安全说明符中要设置的部分(访问规则、审核规则、所有者、主要组)。 + + + 根据指定的安全说明符定义语言 (SDDL) 字符串为此 对象设置安全说明符。 + 用于设置安全说明符的 SDDL 字符串。 + + + 根据指定的安全说明符定义语言 (SDDL) 字符串为此 对象设置安全说明符的指定部分。 + 用于设置安全说明符的 SDDL 字符串。 + 安全说明符中要设置的部分(访问规则、审核规则、所有者、主要组)。 + + + 锁定此 对象以进行写访问。 + + + 取消此 对象的锁定以进行写访问。 + + + 提供在不直接操作访问控制列表 (ACL) 的情况下控制对对象的访问权限的功能;还提供对访问权限进行类型转换的功能。 + 对象的访问权限。 + + + 初始化 ObjectSecurity`1 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 资源的类型。 + + + 初始化 ObjectSecurity`1 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 资源的类型。 + 句柄。 + 要包含的部分。 + + + 初始化 ObjectSecurity`1 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 资源的类型。 + 句柄。 + 要包含的部分。 + 由提供自定义异常的集成器实现的委托。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 初始化 ObjectSecurity`1 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 资源的类型。 + 新的 对象与其相关联的可保护对象的名称。 + 要包含的部分。 + + + 初始化 ObjectSecurity`1 类的新实例。 + 如果新 对象是一个容器对象,则为 true。 + 资源的类型。 + 新的 对象与其相关联的可保护对象的名称。 + 要包含的部分。 + 由提供自定义异常的集成器实现的委托。 + 包含有关异常的源或目标的上下文信息的对象。 + + + 获取与此 ObjectSecurity`1 对象关联的可保护对象的类型。 + 与当前实例关联的可保护对象的类型。 + + + 初始化表示相关安全对象的新访问控制规则 ObjectAccessRule 类的新实例。 + 使用指定的访问权限、访问控制和标志为指定用户表示新的访问控制规则。 + 表示用户帐户。 + 访问类型。 + 如果该访问规则是继承的,则为 true;否则为 false。 + 指定将访问掩码传播到子对象的方法。 + 指定如何将访问控制项 (ACE) 传播到子对象。 + 指定是允许还是拒绝访问。 + + + 获取与此 ObjectSecurity`1 对象的访问规则关联的对象的类型。 + 与当前实例的访问规则关联的对象的类型。 + + + 将指定的访问规则添加到与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL)。 + 要添加的规则。 + + + 将指定的审核规则添加到与此 ObjectSecurity`1 对象关联的系统访问控制列表 (SACL)。 + 要添加的审核规则。 + + + 初始化 类的新实例,它表示指定用户的指定审核规则。 + 返回指定用户的指定审核规则。 + 表示用户帐户。 + 指定访问类型的整数。 + 如果该访问规则是继承的,则为 true;否则为 false。 + 指定将访问掩码传播到子对象的方法。 + 指定如何将访问控制项 (ACE) 传播到子对象。 + 描述要执行的审核类型。 + + + 获取与此 ObjectSecurity`1 对象的审核规则关联的类型对象。 + 与当前实例的审核规则关联的类型对象。 + + + 使用指定句柄将与此 ObjectSecurity`1 对象关联的安全描述符保存到永久性存储。 + 与此 ObjectSecurity`1 对象关联的可保护对象的句柄。 + + + 使用指定名称将与此 ObjectSecurity`1 对象关联的安全描述符保存到永久性存储。 + 与此 ObjectSecurity`1 对象关联的可保护对象的名称。 + + + 从与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全标识符和访问掩码的访问规则。 + 如果访问规则已成功移除,则返回 true;否则返回 false。 + 要移除的规则。 + + + 从与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全标识符的所有访问规则。 + 要移除的访问规则。 + + + 从与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则完全匹配的所有访问规则 + 要移除的访问规则。 + + + 从与此 ObjectSecurity`1 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同安全标识符和访问掩码的审核规则。 + 如果对象已移除,则返回 true;否则返回 false。 + 要移除的审核规则 + + + 从与此 ObjectSecurity`1 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同安全标识符的所有审核规则。 + 要移除的审核规则。 + + + 从与此 ObjectSecurity`1 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则完全匹配的所有审核规则 + 要移除的审核规则。 + + + 移除与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL) 中的所有访问规则,然后添加指定的访问规则。 + 要重置的访问规则。 + + + 从与此 ObjectSecurity`1 对象关联的自由访问控制列表 (DACL) 中移除与指定的访问规则具有相同安全标识符和限定符的所有访问规则,然后添加指定的访问规则。 + 要设置的访问规则。 + + + 从与此 ObjectSecurity`1 对象关联的系统访问控制列表 (SACL) 中移除与指定的审核规则具有相同安全标识符和限定符的所有审核规则,然后添加指定的审核规则。 + 要设置的审核规则。 + + + 命名空间中的方法尝试启用它所不具备的特权时引发的异常。 + + + 初始化 类的新实例。 + + + 使用指定的特权初始化 类的新实例。 + 未启用的特权。 + + + 使用指定的异常初始化 类的新实例。 + 未启用的特权。 + 导致当前异常的异常。如果 参数不是空引用(在 Visual Basic 中为 Nothing),则在处理内部异常的 catch 块中引发当前异常。 + + + 获取未启用的特权的名称。 + 此方法未能启用的特权的名称。 + + + 指定如何将访问面控制项 (ACE) 传播到子对象。仅当存在继承标志时,这些标志才有意义。 + + + 指定 ACE 仅传播到子对象。这将包括容器子对象和子叶对象。 + + + 指定不设置继承标志。 + + + 指定 ACE 不传播到子对象。 + + + 表示包含限定符的访问控制项 (ACE)。由 对象表示的限定符指定 ACE 是允许访问、拒绝访问、导致系统审核或是导致系统警告。 类为 类和 类的抽象基类。 + + + 获取一个指定 ACE 是允许访问、拒绝访问、导致系统审核或是导致系统警告的值。 + 一个指定 ACE 是允许访问、拒绝访问、导致系统审核或是导致系统警告的值。 + + + 返回与此 对象关联的不透明回调数据。 + 一个字节值数组,表示与此 对象关联的不透明回调数据。 + + + 指定此 对象是否包含回调数据。 + 如果此 对象包含回调数据,则为 true;否则为 false。 + + + 获取与此 对象关联的不透明回调数据的长度。此属性仅对回调访问控制项 (ACE) 有效。 + 不透明回调数据的长度。 + + + 设置与此 对象关联的不透明回调数据。 + 一个字节值数组,表示此 对象的不透明回调数据。 + + + 表示访问控制列表 (ACL)。 + + + 使用指定的修订级别初始化 类的新实例。 + 新的访问控制列表 (ACL) 的修订级别。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 使用指定的二进制格式初始化 类的新实例。 + 表示访问控制列表 (ACL) 的字节值数组。 + + 参数中第一个要取消封送的数据的偏移量。 + + + 获取当前 对象的二进制表示形式的长度(以字节为单位)。在使用 方法将 ACL 封送到二进制数组中之前,应使用该长度。 + 当前 对象的二进制表示形式的长度(以字节为单位)。 + + + 获取当前 对象中访问控制项 (ACE) 的数量。 + 当前 对象中 ACE 的数量。 + + + 对象的内容封送到指定字节数组中,其位置从指定的偏移量开始。 + 的内容封送到的字节数组。 + 开始封送的偏移量。 + + 如果为负数或过高,则会将整个 复制到 + + + 在指定的索引处插入指定的访问控制项 (ACE)。 + 要添加新 ACE 的位置。指定 属性的值,以便在 对象的末尾插入一个 ACE。 + 要插入的 ACE。 + + 如果为负数或过高,则会将整个 复制到 + + + 获取或设置指定索引处的访问控制项 (ACE)。 + 指定索引处的 ACE。 + 要获取或设置的 ACE 的从零开始的索引。 + + + 移除指定位置处的访问控制项 (ACE)。 + 要移除的 ACE 的从零开始的索引。 + + 参数的值大于 属性的值减去一,或者为负值。 + + + 获取 的修订级别。 + 一个指定 的修订级别的字节值。 + + + 表示安全性说明符。安全性说明符包含所有者、主要组、自由访问控制列表 (DACL) 和系统访问控制列表 (SACL)。 + + + 使用指定的字节值数组初始化 类的新实例。 + 用于创建新的 对象的字节值数组。 + + 数组中第一个要复制的元素的偏移量。 + + + 用指定的值初始化 类的新实例。 + 指定新的 对象的行为的标志。 + 对象的所有者。 + 对象的主要组。 + 新的 对象的系统访问控制列表 (SACL)。 + 新的 对象的自由访问控制列表 (DACL)。 + + + 使用指定的安全性说明符定义语言 (SDDL) 字符串初始化 类的新实例。 + 用于创建新 对象的 SDDL 字符串。 + + + 获取指定 对象的行为的值。 + 使用逻辑或运算组合的一个或多个 枚举值。 + + + 获取或设置此 对象的自由访问控制列表 (DACL)。DACL 包含访问规则。 + 对象的 DACL。 + + + 获取或设置此 对象的主要组。 + 对象的主要组。 + + + 获取或设置与此 对象关联的对象所有者。 + 与此 对象关联的对象所有者。 + + + 获取或设置表示与此 对象关联的资源管理器控制位的字节值。 + 一个表示与此 对象关联的资源管理器控制位的字节值。 + + + 将此 对象的 属性设置为指定值。 + 使用逻辑或运算组合的一个或多个 枚举值。 + + + 获取或设置此 对象的系统访问控制列表 (SACL)。SACL 包含审核规则。 + 对象的 SACL。 + + + 指定已定义的本机对象类型。 + + + 目录服务 (DS) 对象或者目录服务对象的属性集或属性。 + + + 目录服务对象及其所有属性集和属性。 + + + 文件或目录。 + + + 本地内核对象。 + + + 网络共享。 + + + 打印机。 + + + 提供程序定义的对象。 + + + 注册表项。 + + + WOW64 下的注册表项的对象。 + + + Windows 服务。 + + + 未知的对象类型。 + + + 本地计算机上的窗口站或桌面对象。 + + + Windows Management Instrumentation (WMI) 对象。 + + + 指定要查询或设置的安全性说明符的部分。 + + + 指定自由访问控制列表 (DACL)。 + + + 指定主要组标识符。 + + + 指定所有者标识符。 + + + 指定系统访问控制列表 (SACL)。 + + + 表示系统访问控制列表 (SACL)。 + + + 用指定的值初始化 类的新实例。 + 如果新的 对象是一个容器,则为 true。 + 如果新的 对象是一个目录对象的访问控制列表 (ACL),则为 true。 + 新的 对象的修订级别。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 用指定的值初始化 类的新实例。 + 如果新的 对象是一个容器,则为 true。 + 如果新的 对象是一个目录对象的访问控制列表 (ACL),则为 true。 + 对象可包含的访问控制项 (ACE) 的数量。此数量只作为一种提示。 + + + 使用指定的 对象中的指定值初始化 类的新实例。 + 如果新的 对象是一个容器,则为 true。 + 如果新的 对象是一个目录对象的访问控制列表 (ACL),则为 true。 + 新的 对象的基础 对象。指定 null 以创建空的 ACL。 + + + 将一个审核规则添加到当前 对象。 + 要添加的审核规则的类型。 + 要为其添加审核规则的 。 + 新审核规则的访问掩码。 + 指定新审核规则的继承属性的标志。 + 指定新审核规则的继承传播属性的标志。 + + + 将具有指定设置的审核规则添加到当前 对象。在指定新审核规则的对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 要添加的审核规则的类型。 + 要为其添加审核规则的 。 + 新审核规则的访问掩码。 + 指定新审核规则的继承属性的标志。 + 指定新审核规则的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 新审核规则所应用到的对象的类标识。 + 可以继承新审核规则的子对象的类标识。 + + + 将一个审核规则添加到当前 对象。 + 要为其添加审核规则的 。 + + 新审核规则。 + + + 从当前 对象移除指定的审核规则。 + 如果此方法成功移除指定的审核规则,则为 true;否则为 false。 + 要移除的审核规则的类型。 + 要为其移除审核规则的 。 + 要移除的规则的访问掩码。 + 指定要移除的规则的继承属性的标志。 + 指定要移除的规则的继承传播属性的标志。 + + + 从当前 对象移除指定的审核规则。在指定对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 如果此方法成功移除指定的审核规则,则为 true;否则为 false。 + 要移除的审核规则的类型。 + 要为其移除审核规则的 。 + 要移除的规则的访问掩码。 + 指定要移除的规则的继承属性的标志。 + 指定要移除的规则的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 移除的审核控制规则所应用到的对象的类标识。 + 可以继承移除的审核规则的子对象的类标识。 + + + 从当前 对象移除指定的审核规则。 + 如果此方法成功移除指定的审核规则,则为 true;否则为 false。 + 要为其移除审核规则的 。 + 要为其移除审核规则的 。 + + + 从当前 对象移除指定的审核规则。 + 要移除的审核规则的类型。 + 要为其移除审核规则的 。 + 要移除的规则的访问掩码。 + 指定要移除的规则的继承属性的标志。 + 指定要移除的规则的继承传播属性的标志。 + + + 从当前 对象移除指定的审核规则。在指定对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 要移除的审核规则的类型。 + 要为其移除审核规则的 。 + 要移除的规则的访问掩码。 + 指定要移除的规则的继承属性的标志。 + 指定要移除的规则的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 移除的审核控制规则所应用到的对象的类标识。 + 可以继承移除的审核规则的子对象的类标识。 + + + 从当前 对象移除指定的审核规则。 + 要为其移除审核规则的 。 + + 要删除的规则。 + + + 为指定的 对象设置指定的审核规则。 + 要设置的审核条件。 + 要为其设置审核规则的 。 + 新审核规则的访问掩码。 + 指定新审核规则的继承属性的标志。 + 指定新审核规则的继承传播属性的标志。 + + + 为指定的 对象设置指定的审核规则。在指定对象类型或继承的对象类型时,为目录对象的访问控制列表 (ACL) 使用此方法。 + 要设置的审核条件。 + 要为其设置审核规则的 。 + 新审核规则的访问掩码。 + 指定新审核规则的继承属性的标志。 + 指定新审核规则的继承传播属性的标志。 + 指定 参数是否包含非 null 值的标志。 + 新审核规则所应用到的对象的类标识。 + 可以继承新审核规则的子对象的类标识。 + + + 为指定的 对象设置指定的审核规则。 + 要为其设置审核规则的 。 + 要为其设置审核规则的 。 + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hant/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hant/System.Security.AccessControl.xml new file mode 100644 index 0000000..3be759d --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard1.3/zh-hant/System.Security.AccessControl.xml @@ -0,0 +1,1974 @@ + + + + System.Security.AccessControl + + + + 指定允許對安全物件進行的動作。 + + + 指定唯寫存取。 + + + 未指定存取。 + + + 指定唯讀存取。 + + + 指定要執行的存取控制 (Access Control) 修改型別。這個列舉型別 (Enumeration) 由 類別及其子類別的方法所使用。 + + + 將指定的授權規則加入存取控制清單 (ACL)。 + + + 移除 ACL 中包含與指定授權規則相同之安全識別項 (SID) 和存取遮罩的授權規則。 + + + 移除 ACL 中包含與指定驗證規則相同之 SID 的授權規則。 + + + 移除 ACL 中與指定授權規則完全相符的授權規則。 + + + 移除 ACL 中包含與指定授權規則相同之 SID 的授權規則,然後將指定的授權規則加入 ACL。 + + + 移除 ACL 中的所有授權規則,然後將指定的授權規則加入 ACL。 + + + 指定要儲存或載入的安全性描述元 (Security Descriptor) 區段。 + + + Discretionary 存取控制清單 (DACL)。 + + + 整個安全性描述元。 + + + 系統存取控制清單 (SACL)。 + + + 主要群組。 + + + 沒有區段。 + + + 擁有人。 + + + 指定 物件是用於允許存取還是拒絕存取。這些值不是旗標,它們也不可組合。 + + + + 物件是用於允許存取安全物件。 + + + + 物件是用於拒絕存取安全物件。 + + + 表示使用者的識別 (Identity)、存取遮罩和存取控制 (Access Control) 型別 (允許或拒絕) 的組合。 物件還包含子物件如何繼承規則,以及如何傳用該繼承的相關資訊。 + + + 使用指定的值,初始化 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。這個參數必須是可轉型成 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + 如果這個規則是從父容器繼承,則為 true。 + 存取規則的繼承 (Inheritance) 屬性。 + 是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 有效的存取控制型別。 + + 參數的值不能轉型成 ,或是 參數包含無效的值。 + + 參數的值為零,或是 參數包含無法辨認的旗標值。 + + + 取得與這個 物件相關聯的 值。 + 與這個 物件相關聯的 值。 + + + 表示使用者的識別 (Identity)、存取遮罩和存取控制 (Access Control) 型別 (允許或拒絕) 的組合。AccessRule`1 物件還包含子物件如何繼承規則,以及如何傳用該繼承的相關資訊。 + 存取規則的存取權限類型。 + + + 使用指定的值,初始化 AccessRule’1 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。 + 存取規則的權限。 + 有效的存取控制型別。 + + + 使用指定的值,初始化 AccessRule’1 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。 + 存取規則的權限。 + 存取規則的繼承 (Inheritance) 屬性。 + 是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 有效的存取控制型別。 + + + 使用指定的值,初始化 AccessRule’1 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。 + 存取規則的權限。 + 有效的存取控制型別。 + + + 使用指定的值,初始化 AccessRule’1 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。 + 存取規則的權限。 + 存取規則的繼承 (Inheritance) 屬性。 + 是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 有效的存取控制型別。 + + + 取得目前執行個體的權限。 + 目前執行個體的權限,轉型為類型 <T>。 + + + 提供在存取控制清單 (ACL) 中逐一查看存取控制項目 (ACE) 的功能。 + + + 取得 集合中的目前項目。這個屬性會取得物件的易記型別版本。 + + 集合中的目前項目。 + + + 讓列舉程式前進至 集合中的下一個項目。 + 如果列舉值成功地前移至下一個項目,則為 true,如果列舉值已超過集合的結尾,則為 false。 + 在建立列舉值之後,會修改集合。 + + + 將列舉值設為它的初始位置,即 集合中的第一個項目之前。 + 在建立列舉值之後,會修改集合。 + + + + 指定存取控制項目 (ACE) 的繼承 (Inheritance) 和稽核行為。 + + + 稽核所有的存取嘗試。 + + + 存取遮罩會傳用至子容器 (Container) 物件。 + + + 稽核失敗的存取嘗試。 + + + + 的邏輯 OR。 + + + ACE 是從父容器繼承而非明確設定用於物件。 + + + 存取遮罩只會傳用至子物件。這同時包含容器和分葉子物件。 + + + 未設定 ACE 旗標。 + + + 存取檢查不適用於物件,只適用於其子系。 + + + 存取遮罩會傳用至子分葉物件。 + + + 稽核成功的存取嘗試。 + + + 指定存取控制項目 (ACE) 的功能。 + + + 允許存取。 + + + 拒絕存取。 + + + 引起系統警示。 + + + 引起系統稽核。 + + + 定義可用的存取控制項目 (ACE) 型別。 + + + 允許對 物件識別之特定信任項物件的存取。 + + + 允許對 物件識別之特定信任項物件的存取。這個 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 允許對物件、屬性集或屬性的存取。ACE 包含一組存取權限、識別物件型別的 GUID,以及識別系統要授與存取權之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。這個 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 已定義但從未使用。在這裡併入以求完整性。 + + + 允許對物件、屬性集或屬性的存取。ACE 包含一組存取權限、識別物件型別的 GUID,以及識別系統要授與存取權之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。 + + + 拒絕對 物件識別之特定信任項物件的存取。 + + + 拒絕對 物件識別之特定信任項物件的存取。此 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 拒絕對物件、屬性集或屬性的存取。ACE 包含一組存取權限、識別物件型別的 GUID,以及識別系統要授與存取權之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。此 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 拒絕對物件、屬性集或屬性的存取。ACE 包含一組存取權限、識別物件型別的 GUID,以及識別系統要授與存取權之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。 + + + 追蹤列舉型別中定義的最大 ACE 型別。 + + + 保留供將來使用。 + + + 保留供將來使用。 + + + 保留供將來使用。 + + + 保留供將來使用。 + + + 在指定的信任項嘗試取得物件的存取權時,記錄稽核訊息。此信任項是由 物件識別。 + + + 在指定的信任項嘗試取得物件的存取權時,記錄稽核訊息。此信任項是由 物件識別。此 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 在指定的信任項嘗試取得物件或子物件 (例如屬性集或屬性) 的存取權時,記錄稽核訊息。ACE 包含一組存取權限、識別物件或子物件型別的 GUID,以及識別系統要稽核存取之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。此 ACE 型別可包含選擇性的回呼資料。回呼資料是未解譯的資源管理員特定 BLOB。 + + + 在指定的信任項嘗試取得物件或子物件 (例如屬性集或屬性) 的存取權時,記錄稽核訊息。ACE 包含一組存取權限、識別物件或子物件型別的 GUID,以及識別系統要稽核存取之信任項的 物件。ACE 也包含 GUID 和一組可依照子物件控制 ACE 繼承的旗標。 + + + 指定稽核嘗試存取安全物件的條件。 + + + 稽核失敗的存取嘗試。 + + + 不稽核任何存取嘗試。 + + + 稽核成功的存取嘗試。 + + + 表示使用者識別 (Identity) 和存取遮罩的組合。 物件還包含子物件如何繼承規則、如何傳用繼承,以及稽核繼承條件的相關資訊。 + + + 使用指定的值,初始化 類別的新執行個體。 + 要套用稽核規則的識別。它必須是可以轉型為 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + true 表示從父容器繼承這個規則。 + 稽核規則的繼承屬性。 + 是否要自動傳用繼承的稽核規則。如果 設為 ,將略過傳用旗標。 + 稽核規則的條件。 + + 參數的值不能轉型成 ,或是 參數包含無效的值。 + + 參數的值為零,或是 參數包含無法辨認的旗標值。 + + + 取得這個稽核規則的稽核旗標。 + 列舉值的位元組合。這個組合指定此稽核規則的稽核條件。 + + + 表示使用者識別和存取遮罩的組合。 + + + + 使用指定的值,初始化 AuditRule’1 類別的新執行個體。 + 要套用這個稽核規則的識別。 + 稽核規則的權限。 + 要稽核其規則的條件。 + + + 使用指定的值,初始化 AuditRule’1 類別的新執行個體。 + 要套用稽核規則的識別。 + 稽核規則的權限。 + 稽核規則的繼承屬性。 + 是否要自動傳用繼承的稽核規則。 + 稽核規則的條件。 + + + 使用指定的值,初始化 AuditRule’1 類別的新執行個體。 + 要套用稽核規則的識別。 + 稽核規則的權限。 + 稽核規則的屬性。 + + + 使用指定的值,初始化 AuditRule’1 類別的新執行個體。 + 要套用稽核規則的識別。 + 稽核規則的權限。 + 稽核規則的繼承屬性。 + 是否要自動傳用繼承的稽核規則。 + 稽核規則的條件。 + + + 稽核規則的權限。 + 傳回 + + + 決定對安全物件的存取。衍生類別 (Derived Class) 會為存取和稽核功能提供特製化。 + + + 使用指定的值,初始化 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。這個參數必須是可轉型成 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + true 表示從父容器繼承這個規則。 + 存取規則的繼承 (Inheritance) 屬性。 + 是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + + 參數的值無法轉型成 + + 參數的值為零,或是 參數包含無法辨認的旗標值。 + + + 取得這個規則的存取遮罩。 + 這個規則的存取遮罩。 + + + 取得套用這個規則的 + 套用這個規則的 + + + 取得旗標值,判斷子物件如何繼承這個規則。 + 列舉值的位元組合。 + + + 取得值,指出這個規則是明確設定還是從父容器物件繼承。 + 如果這個規則並非明確設定而是從父容器繼承,則為 true。 + + + 取得傳用旗標值,決定這個規則的繼承如何傳用至子物件。只有在 列舉型別 (Enumeration) 的值不是 時,這個屬性才有意義。 + 列舉值的位元組合。 + + + 表示 物件的集合。 + + + 初始化 類別的新執行個體。 + + + 物件加入集合。 + 要加入至集合中的 物件。 + + + 複製集合的內容至陣列。 + 要複製集合內容至其中的陣列。 + 要開始複製之以零起始的索引。 + + + + 取得集合中位於指定索引的 物件。 + 在指定之索引處的 物件。 + 要取得的 物件之以零起始的索引。 + + + + + + + 表示存取控制項目 (ACE)。 + + + 初始化 類別的新執行個體。 + 旗標,指定新存取控制項目 (ACE) 之繼承 (Inheritance)、繼承傳用和稽核條件的相關資訊。 + 新 ACE 的使用方式。 + ACE 的存取遮罩。 + 與新 ACE 相關聯的 。 + true 表示指定新 ACE 為回呼 (Callback) 型別 ACE。 + 與新 ACE 相關聯的不透明資料。不透明資料只適用於回呼 ACE 類型。這個陣列的長度不能大於 方法的傳回值。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。將 ACL 封送處理至二進位陣列之前,以 方法使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 物件的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 陣列。 + + + 取得回呼存取控制項目 (ACE) 之不透明資料 BLOB (二進位大型物件) 的最大允許長度。 + 不透明資料 BLOB 的允許長度。 + true 表示指定 物件為回呼 ACE 型別。 + + + 代表存取控制清單 (ACL),且為 類別的基底類別。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將存取控制清單 (ACL) 封送處理至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 取得目前 物件中的存取控制項目 (ACE) 數目。 + 目前 物件中的 ACE 數目。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + + 取得布林值,指定目前 物件中的存取控制項目 (ACE) 是否為標準順序。 + 如果目前 物件中的 ACE 為標準順序則為 true;否則為 false。 + + + 設定 物件是否為容器。 + 如果目前 物件是容器,則為 true。 + + + 設定目前 物件是否為目錄物件存取控制清單 (ACL)。 + 如果目前 物件是目錄物件 ACL,則為 true。 + + + 取得或設定在指定索引處的 + 指定索引處的 + 要取得或設定的 的以零起始的索引。 + + + 移除與指定 物件相關聯之這個 物件中包含的所有存取控制項目 (ACE)。 + 要檢查的 物件。 + + + 從這個 物件移除所有繼承的存取控制項目 (ACE)。 + + + 取得 的修訂層級。 + 位元組值,指定 的修訂層級。 + + + 無需直接管理存取控制清單 (ACL) 即可控制對物件的存取。這個類別是 類別的抽象基底類別。 + + + 初始化 類別的新執行個體。 + 如果新物件是容器物件,則為 true。 + + + 將指定的存取規則加入與這個 物件相關聯的 Discretionary 存取控制清單 (DACL)。 + 要加入的存取規則。 + + + 將指定的稽核規則加入與這個 物件相關聯的系統存取控制清單 (SACL)。 + 要加入的稽核規則。 + + + 取得與指定之安全識別項相關聯的存取規則集合。 + 與指定之 物件相關聯的存取規則集合。 + true 表示包括為物件明確設定的存取規則。 + true 表示包括繼承的存取規則。 + 指定要擷取存取規則的安全識別項屬於 T:System.Security.Principal.SecurityIdentifier 型別或 T:System.Security.Principal.NTAccount 型別。這個參數值所屬的型別必須可以轉譯為 型別。 + + + + + + 取得與指定之安全識別項相關聯的稽核規則集合。 + 與指定之 物件相關聯的稽核規則集合。 + true 表示包括為物件明確設定的稽核規則。 + true 表示包括繼承的稽核規則。 + 要擷取稽核規則的安全識別項。這必須是可轉型為 物件的物件。 + + + + + + 將指定的修改套用至與這個 物件相關聯的 Discretionary 存取控制清單 (DACL)。 + 如果 DACL 修改成功,則為 true,否則為 false。 + 要套用至 DACL 的修改。 + 要修改的存取規則。 + 如果 DACL 修改成功,則為 true,否則為 false。 + + + 將指定的修改套用至與這個 物件相關聯的系統存取控制清單 (SACL)。 + 如果 SACL 修改成功,則為 true,否則為 false。 + 要套用至 SACL 的修改。 + 要修改的稽核規則。 + 如果 SACL 修改成功,則為 true,否則為 false。 + + + 從與這個 物件相關聯的 Discretionary 存取控制清單 (DACL),移除與指定的存取規則包含相同安全識別項和存取遮罩的存取規則。 + 如果成功移除存取規則,則為 true,否則為 false。 + 要移除的存取規則。 + + + 從與這個 物件相關聯的 Discretionary 存取控制清單 (DACL),移除與指定的存取規則具有相同安全識別項的所有存取規則。 + 要移除的存取規則。 + + + 從與這個 物件相關聯的 Discretionary 存取控制清單 (DACL),移除與指定的存取規則完全相符的所有存取規則。 + 要移除的存取規則。 + + + 從與這個 物件相關聯的系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項和存取遮罩的稽核規則。 + 如果成功移除稽核規則,則為 true,否則為 false。 + 要移除的稽核規則。 + + + 從與這個 物件相關聯的系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項的所有稽核規則。 + 要移除的稽核規則。 + + + 從與這個 物件相關聯的系統存取控制清單 (SACL),移除與指定稽核規則完全相符的所有稽核規則。 + 要移除的稽核規則。 + + + 移除與這個 物件相關聯之 Discretionary 存取控制清單 (DACL) 中的所有存取規則,然後加入指定的存取規則。 + 要重設的存取規則。 + + + 從與這個 物件相關聯之 Discretionary 存取控制清單 (DACL),移除與指定的存取規則包含相同安全識別項和限定詞的所有存取規則,然後加入指定的存取規則。 + 要設定的存取規則。 + + + 從與這個 物件相關聯之系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項和限定詞的所有稽核規則,然後加入指定的稽核規則。 + 要設定的稽核規則。 + + + 表示安全性描述元 (Security Descriptor)。安全性描述元包括擁有人、主要群組、Discretionary 存取控制清單 (DACL) 和系統存取控制清單 (SACL)。 + + + 從指定的位元組值陣列,初始化 類別的新執行個體。 + 如果新的安全性描述元與容器物件相關聯,則為 true。 + 如果新的安全性描述元與目錄物件相關聯,則為 true。 + 位元組值陣列,從其中建立新的 物件。 + + 陣列中開始複製的位移。 + + + 從指定的資訊,初始化 類別的新執行個體。 + 如果新的安全性描述元與容器物件相關聯,則為 true。 + 如果新的安全性描述元與目錄物件相關聯,則為 true。 + 旗標,指定新 物件的行為。 + 物件擁有人。 + 物件的主要群組。 + 物件的系統存取控制清單 (SACL)。 + 物件的 Discretionary 存取控制清單 (DACL)。 + + + 從指定的 物件,初始化 類別的新執行個體。 + 如果新的安全性描述元與容器物件相關聯,則為 true。 + 如果新的安全性描述元與目錄物件相關聯,則為 true。 + + 物件,從其中建立新的 物件。 + + + 從指定的安全性描述元定義語言 (SDDL) 字串,初始化 類別的新執行個體。 + 如果新的安全性描述元與容器物件相關聯,則為 true。 + 如果新的安全性描述元與目錄物件相關聯,則為 true。 + SDDL 字串,從其中建立新的 物件。 + + + 設定屬性這執行個體和設定旗標。 + 物件的修訂層級。 + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 設定屬性這執行個體和設定旗標。 + 物件的修訂層級。 + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 取得指定 物件之行為的值。 + 與邏輯 OR 運算結合的一或多個 列舉型別的值。 + + + 取得或設定這個 物件的 Discretionary 存取控制清單 (DACL)。DACL 包含存取規則。 + 這個 物件的 DACL。 + + + 取得或設定這個 物件的主要群組。 + 這個 物件的主要群組。 + + + 取得布林值 (Boolean) ,指定與這個 物件相關聯的物件是否為容器物件。 + 如果與這個 物件相關聯的物件是容器物件則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的 Discretionary 存取控制清單 (DACL) 是否為標準順序。 + 如果與這個 物件相關聯的 DACL 為標準順序則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的物件是否為目錄物件。 + 如果與這個 物件相關聯的物件為目錄物件則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的系統存取控制清單 (SACL) 是否為標準順序。 + 如果與這個 物件相關聯的 SACL 為標準順序則為 true,否則為 false。 + + + 取得或設定與這個 物件相關聯的物件擁有人。 + 與這個 物件相關聯的物件擁有人。 + + + 從與這個 物件相關聯的 Discretionary 存取控制清單 (DACL),移除指定安全識別項 (Security Identifier) 的所有存取規則。 + 要移除存取規則的安全識別項。 + + + 從與這個 物件相關聯的系統存取控制清單 (SACL),移除指定安全識別項的所有稽核規則。 + 要移除稽核規則的安全識別項。 + + + 設定與這個 物件相關聯之 Discretionary 存取控制清單 (DACL) 的繼承保護。保護的 DACL 不會從父容器繼承存取規則。 + true 表示保護 DACL,使其不繼承。 + true 表示在 DACL 中保留繼承存取規則,false 表示移除 DACL 中的繼承存取規則。 + + + 設定與這個 物件相關聯之系統存取控制清單 (SACL) 的繼承保護。保護的 SACL 不會從父容器繼承稽核規則。 + true 表示保護 SACL,使其不繼承。 + true 表示在 SACL 中保留繼承稽核規則,false 表示移除 SACL 中的繼承稽核規則。 + + + 取得或設定這個 物件的系統存取控制清單 (SACL)。SACL 包含稽核規則。 + 這個 物件的 SACL。 + + + 表示複合存取控制項目 (ACE)。 + + + 初始化 類別的新執行個體。 + 包含旗標,這些旗標會指定新存取控制項目 (ACE) 之繼承 (Inheritance)、繼承傳用和稽核條件的相關資訊。 + ACE 的存取遮罩。 + + 列舉中的值。 + 與新 ACE 相關聯的 。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 取得或設定這個 物件的型別。 + 這個 物件的型別。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 指定 物件的型別。 + + + + 物件是用於模擬。 + + + 這些旗標會影響安全性描述元 (Security Descriptor) 行為。 + + + 指定已自動從父代繼承 Discretionary 存取控制清單 (DACL)。僅由資源管理員設定。 + + + 已忽略。 + + + 指定 DACL 已由預設機制取得。僅由資源管理員設定。 + + + 指定 DACL 不為 null。由資源管理員或使用者設定。 + + + 指定資源管理員防止自動繼承。由資源管理員或使用者設定。 + + + 已忽略。 + + + 指定群組 已由預設機制取得。只由資源管理員設定,不應由呼叫端設定。 + + + 沒有控制旗標。 + + + 指定擁有人 已由預設機制取得。只由資源管理員設定,不應由呼叫端設定。 + + + 指定保留欄位的內容有效。 + + + 指定安全性描述元的二進位表示使用自我相關格式。一定會設定這個旗標。 + + + 已忽略。 + + + 指定已自動從父代繼承系統存取控制清單 (SACL)。僅由資源管理員設定。 + + + 已忽略。 + + + 指定 SACL 已由預設機制取得。僅由資源管理員設定。 + + + 指定 SACL 不為 null。由資源管理員或使用者設定。 + + + 指定資源管理員防止自動繼承。由資源管理員或使用者設定。 + + + 表示未由其中一個 列舉型別 (Enumeration) 成員定義的存取控制項目 (ACE)。 + + + 初始化 類別的新執行個體。 + 新存取控制項目 (ACE) 的型別。這個值必須大於 。 + 旗標,指定新 ACE 之繼承 (Inheritance)、繼承傳用 (Propagation) 和稽核條件的相關資訊。 + 包含新 ACE 之資料的位元組值陣列。這個值可以是 null。這個陣列的長度不能大於 欄位的值,且必須為四的倍數。 + + 參數的值未大於 ,或者 陣列的長度大於 欄位的值,或不是四的倍數。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理 (Marshaling) 至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 傳回與這個 物件相關聯的不透明資料。 + 元組值陣列,表示與這個 物件相關聯的不透明資料。 + + + 傳回這個 物件之不透明資料 Blob 允許的最大長度。 + + + 取得與這個 物件相關聯的不透明資料長度。 + 不透明回呼 (Callback) 資料的長度。 + + + 設定與這個 物件相關聯的不透明回呼資料。 + 位元組值陣列,表示這個 物件的不透明回呼資料。 + + + 表示 Discretionary 存取控制清單 (DACL)。 + + + 使用指定的值,初始化 類別的新執行個體。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 物件的修訂層級。 + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 使用指定的值,初始化 類別的新執行個體。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 使用指定的 物件中的指定值,初始化 類別的新執行個體。 + true if the new object is a container. + true if the new object is a directory object Access Control List (ACL). + The underlying object for the new object.您可以指定 null 以建立空的 ACL。 + + + 將包含指定設定的存取控制項目 (ACE) 加入目前的 物件。 + 要加入的存取控制型別 (允許或拒絕)。 + 要加入 ACE 的 。 + 新 ACE 的存取規則。 + 旗標,指定新 ACE 的繼承屬性。 + 旗標,指定新 ACE 的繼承傳用屬性。 + + + 將包含指定設定的存取控制項目 (ACE) 加入目前的 物件。為新的 ACE 指定物件型別或繼承的物件型別時,您可以將這個方法用於目錄物件存取控制清單 (ACL)。 + 要加入的存取控制型別 (允許或拒絕)。 + 要加入 ACE 的 。 + 新 ACE 的存取規則。 + 旗標,指定新 ACE 的繼承屬性。 + 旗標,指定新 ACE 的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用新 ACE 之物件類別的識別。 + 可繼承新 ACE 之子物件類別的識別。 + + + 將包含指定設定的存取控制項目 (ACE) 加入目前的 物件。 + 要加入的存取控制型別 (允許或拒絕)。 + 要加入 ACE 的 。 + + 新的存取權。 + + + 從目前的 物件移除指定的存取控制規則。 + 如果這個方法成功移除指定的存取,則為 true,否則為 false。 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除存取控制規則的 。 + 要移除之規則的存取遮罩。 + 旗標,指定要移除之規則的繼承屬性。 + 旗標,指定要移除之規則的繼承傳用屬性。 + + + 從目前的 物件移除指定的存取控制規則。指定物件型別或繼承物件型別時,將這個方法用於目錄物件存取控制清單 (ACL)。 + 如果這個方法成功移除指定的存取,則為 true,否則為 false。 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除存取控制規則的 。 + 要移除之存取控制規則的存取遮罩。 + 旗標,指定要移除之存取控制規則的繼承屬性。 + 旗標,指定要移除之存取控制規則的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用移除之存取控制規則的物件類別識別。 + 可繼承移除之存取控制規則的子物件類別識別。 + + + 從目前的 物件移除指定的存取控制規則。 + 傳回 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除存取控制規則的 。 + + 要移除存取權。 + + + 從目前的 物件,移除指定的存取控制項目 (ACE)。 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除 ACE 的 。 + 要移除之 ACE 的存取遮罩。 + 旗標,指定要移除之 ACE 的繼承屬性。 + 旗標,指定要移除之 ACE 的繼承傳用屬性。 + + + 從目前的 物件,移除指定的存取控制項目 (ACE)。為要移除的 ACE 指定物件型別或繼承的物件型別時,您可以將這個方法用於目錄物件存取控制清單 (ACL)。 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除 ACE 的 。 + 要移除之 ACE 的存取遮罩。 + 旗標,指定要移除之 ACE 的繼承屬性。 + 旗標,指定要移除之 ACE 的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用移除之 ACE 的物件類別識別。 + 可繼承移除之 ACE 的子物件類別識別。 + + + 從目前的 物件,移除指定的存取控制項目 (ACE)。 + 要移除的存取控制型別 (允許或拒絕)。 + 要移除 ACE 的 。 + + 要移除存取權。 + + + 為指定的 物件設定指定的存取控制。 + 要設定的存取控制型別 (允許或拒絕)。 + 要設定 ACE 的 。 + 新 ACE 的存取規則。 + 旗標,指定新 ACE 的繼承屬性。 + 旗標,指定新 ACE 的繼承傳用屬性。 + + + 為指定的 物件設定指定的存取控制。 + 要設定的存取控制型別 (允許或拒絕)。 + 要設定 ACE 的 。 + 新 ACE 的存取規則。 + 旗標,指定新 ACE 的繼承屬性。 + 旗標,指定新 ACE 的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用新 ACE 之物件類別的識別。 + 可繼承新 ACE 之子物件類別的識別。 + + + 為指定的 物件設定指定的存取控制。 + 要設定的存取控制型別 (允許或拒絕)。 + 要設定 ACE 的 。 + + 要將存取權限。 + + + 表示存取控制項目 (ACE),且為所有其他 ACE 類別的基底類別。 + + + 取得或設定與這個 物件相關聯的 + 與這個 物件相關聯的 + + + 取得這個存取控制項目 (ACE) 的型別。 + 這個 ACE 的型別。 + + + 取得與這個存取控制項目 (ACE) 相關聯的稽核資訊。 + 與這個存取控制項目 (ACE) 相關聯的稽核資訊。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 建立這個存取控制項目 (ACE) 的深層複本 (Deep Copy)。 + 這個方法建立的 物件。 + + + 從指定的二進位資料建立 物件。 + 這個方法建立的 物件。 + 二進位資料,從中建立新的 物件。 + 要開始解封送處理 (Unmarshaling) 的位移。 + + + 判斷指定的 物件是否等於目前的 物件。 + 如果指定的 物件等於目前的 物件,則為 true,否則為 false。 + 要與目前 物件進行比較的 物件。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 做為 類別的雜湊函式。 方法適用於雜湊演算法和雜湊資料表這類的資料結構。 + 目前 物件的雜湊程式碼。 + + + 取得旗標,指定這個存取控制項目 (ACE) 的繼承屬性。 + 旗標,指定這個 ACE 的繼承屬性。 + + + 取得布林值 (Boolean),指定這個存取控制項目 (ACE) 是繼承的還是明確設定的。 + 如果這個 ACE 是繼承的,則為 true,否則為 false。 + + + 判斷指定的 物件是否視為相等。 + 如果兩個 物件相等則為 true,否則為 false。 + 要比較的第一個 物件。 + 要比較的第二個 。 + + + 判斷指定的 物件是否視為不相等。 + 如果兩個 物件不相等,則為 true,否則為 false。 + 要比較的第一個 物件。 + 要比較的第二個 。 + + + 取得旗標,指定這個存取控制項目 (ACE) 的繼承傳用屬性。 + 旗標,指定這個 ACE 的繼承傳用屬性。 + + + 表示存取控制清單 (ACL),且為 類別的基底類別。 + + + 初始化 類別的新執行個體。 + + + 目前 的修訂層級。這個值是由存取控制清單 (ACL) 的 屬性傳回,而這些存取控制清單未與目錄服務物件相關聯。 + + + 目前 的修訂層級。這個值是由存取控制清單 (ACL) 的 屬性傳回,而這些存取控制清單與目錄服務物件相關聯。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理 (Marshaling) 至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 複製目前 的每個 至指定的陣列。 + 陣列,放置目前 包含之 物件的複本。 + + 中以零起始的索引,位於複製開始的位置。 + + + 取得目前 物件中的存取控制項目 (ACE) 數目。 + 目前 物件中的 ACE 數目。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 傳回 類別的新執行個體。 + 這個方法傳回的 + + + 這個屬性永遠會設為 false。它只會因為 介面的實作 (Implementation) 需要而進行實作。 + 一定是 false。 + + + 取得或設定在指定索引處的 + 在指定索引處的 + 要取得或設定之 的以零起始的索引。 + + + 允許的 物件最大二進位長度。 + + + 取得 的修訂層級。 + 位元組值,指定 的修訂層級。 + + + 這個屬性永遠傳回 null。它只會因為 介面的實作 (Implementation) 需要而進行實作。 + 永遠傳回 null。 + + + 複製目前 的每個 至指定的陣列。 + 陣列,放置目前 包含之 物件的複本。 + + 中以零起始的索引,位於複製開始的位置。 + + + 傳回 類別的新執行個體,轉型為 介面的執行個體。 + 新的 物件,轉型為 介面的執行個體。 + + + 表示安全性描述元 (Security Descriptor)。安全性描述元包括擁有人、主要群組、Discretionary 存取控制清單 (DACL) 和系統存取控制清單 (SACL)。 + + + 初始化 類別的新執行個體。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理 (Marshaling) 至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 取得指定 物件之行為的值。 + 與邏輯 OR 運算結合的一或多個 列舉型別的值。 + + + 傳回位元組值陣列,表示這個 物件中包含的資訊。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 傳回此 物件所表示之安全性描述元中指定區段的安全性描述元定義語言 (SDDL) 表示。 + 與這個 物件相關聯之安全性描述元中指定區段的 SDDL 表示。 + 指定要取得安全性描述元的哪個區段 (存取規則、稽核規則、主要群組或擁有人)。 + + + 取得或設定這個 物件的主要群組。 + 這個 物件的主要群組。 + + + 傳回布林 (Boolean) 值,指定與這個 物件相關聯的安全性描述元是否可轉換為安全性描述元定義語言 (SDDL) 格式。 + 如果與這個 物件相關聯的安全性描述元可轉換為安全性描述元定義語言 (SDDL) 格式,則為 true,否則為 false。 + + + 取得或設定與這個 物件相關聯的物件擁有人。 + 與這個 物件相關聯的物件擁有人。 + + + 取得 物件的修訂層級。 + 位元組值,指定 的修訂層級。 + + + 繼承 (Inheritance) 旗標會指定存取控制項目 (ACE) 的繼承語意。 + + + ACE 由子容器 (Container) 物件繼承。 + + + 子物件不繼承 ACE。 + + + ACE 由子分葉物件繼承。 + + + 封裝 Microsoft Corporation 目前定義的所有存取控制項目 (ACE) 型別。所有的 物件都包含 32 位元的存取遮罩和 物件。 + + + 取得或設定這個 物件的存取遮罩。 + 這個 物件的存取遮罩。 + + + 取得或設定與這個 物件相關聯的 物件。 + 與這個 物件關聯的 物件。 + + + 提供無需直接管理存取控制清單 (ACL),即可控制對原生物件之存取的功能。原生物件型別是由 列舉型別 (Enumeration) 所定義。 + + + 使用指定的值,初始化 類別的新執行個體。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + + + 使用指定的值,初始化 類別的新執行個體。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + 與新 物件相關聯之安全物件的控制代碼。 + 其中一個 列舉值,指定要包含在這個 物件中之安全物件安全性描述元 (存取規則、稽核規則、擁有人、主要群組) 的區段。 + + + 使用指定的值,初始化 類別的新執行個體。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + 與新 物件相關聯之安全物件的控制代碼。 + 其中一個 列舉值,指定要包含在這個 物件中之安全物件安全性描述元 (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 委派由提供自訂例外狀況的整合子實作。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 使用指定的值,初始化 類別的新執行個體。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + 委派由提供自訂例外狀況的整合子實作。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 使用指定的值,初始化 類別的新執行個體。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + 與新 物件相關聯之安全物件的名稱。 + 其中一個 列舉值,指定要包含在這個 物件中之安全物件安全性描述元 (存取規則、稽核規則、擁有人、主要群組) 的區段。 + + + 使用指定的值,初始化 類別的新執行個體。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 如果新 物件是容器物件,則為 true。 + 與新 物件相關聯的安全物件型別。 + 與新 物件相關聯之安全物件的名稱。 + 其中一個 列舉值,指定要包含在這個 物件中之安全物件安全性描述元 (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 委派由提供自訂例外狀況的整合子實作。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 與這個 物件相關聯之安全物件的控制代碼。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 與這個 物件相關聯的安全物件為目錄或檔案,且找不到該目錄或檔案。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 與這個 物件相關聯之安全物件的控制代碼。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + 與這個 物件相關聯的安全物件為目錄或檔案,且找不到該目錄或檔案。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 與這個 物件相關聯之安全物件的名稱。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 與這個 物件相關聯的安全物件為目錄或檔案,且找不到該目錄或檔案。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱「備註」。 + 與這個 物件相關聯之安全物件的名稱。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + 與這個 物件相關聯的安全物件為目錄或檔案,且找不到該目錄或檔案。 + + + 提供方法,便於整合子 (Integrator) 將數字錯誤碼對應至其建立的特定例外狀況。 + 這個委派 (Delegate) 建立的 + 數字錯誤碼。 + 物件相關聯之安全物件的名稱。 + 物件相關聯之安全物件的控制代碼。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 表示使用者的識別 (Identity)、存取遮罩和存取控制 (Access Control) 型別 (允許或拒絕) 的組合。 物件還包含要套用規則的物件型別、可繼承規則的子物件型別、子物件如何繼承規則,以及如何傳用繼承的相關資訊。 + + + 使用指定的值,初始化 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。它必須是可以轉型為 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + 如果這個規則是從父容器繼承,則為 true。 + 指定存取規則的繼承 (Inheritance) 屬性。 + 指定是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 要套用規則的物件型別。 + 可繼承規則的子物件型別。 + 指定這個規則是允許存取還是拒絕存取。 + + 參數的值不能轉型成 ,或是 參數包含無效的值。 + + 參數的值為 0,或 參數包含無法辨認的旗標值。 + + + 取得可繼承 物件的子物件型別。 + 可繼承 物件的子物件型別。 + + + 取得旗標,指定 物件的 屬性是否包含有效值。 + + 會指定 屬性包含有效值。 會指定 屬性包含有效值。這些值可與邏輯 OR 組合。 + + + 取得要套用 的物件型別。 + 要套用 的物件型別。 + + + 控制對目錄服務物件的存取。這個類別會表示與目錄物件相關聯的存取控制項目 (ACE)。 + + + 初始化 類別的新執行個體。 + 新存取控制項目 (ACE) 的繼承 (Inheritance)、繼承傳用 (Propagation) 和稽核條件。 + 新 ACE 的使用方式。 + ACE 的存取遮罩。 + 與新 ACE 相關聯的 。 + + 參數是否包含有效的物件 GUID。 + GUID,可識別要套用新 ACE 的物件型別。 + GUID,可識別可繼承新 ACE 的物件型別。 + 如果新 ACE 為回呼 (Callback) 型別 ACE,則為 true。 + 與新 ACE 相關聯的不透明資料。這只適用於回呼 ACE 型別。這個陣列的長度不能大於 方法的傳回值。 + 限定詞 (Qualifier) 參數包含無效值或不透明參數值的長度大於 方法的傳回值。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 取得或設定物件型別的 GUID,這個物件型別可以繼承這個 物件表示的存取控制項目 (ACE)。 + 物件型別的 GUID,這個物件型別可繼承這個 物件表示的存取控制項目 (ACE)。 + + + 傳回回呼存取控制項目 (ACE) 之不透明資料 BLOB 的最大允許長度 (以位元組為單位)。 + 回呼存取控制項目 (ACE) 之不透明資料 BLOB 的最大允許長度 (以位元組為單位)。 + 如果 為回呼 ACE 型別,則為 True。 + + + 取得或設定旗標,指定 屬性是否包含識別有效物件型別的值。 + 與邏輯 OR 運算結合之一或多個 列舉型別的成員。 + + + 取得或設定與這個 物件相關聯的物件型別 GUID。 + 與這個 物件相關聯的物件型別 GUID。 + + + 指定存取控制項目 (ACE) 的物件型別是否存在。 + + + 可繼承 ACE 的物件型別。 + + + 物件型別不存在。 + + + 與 ACE 相關聯的物件型別存在。 + + + 表示使用者識別 (Identity)、存取遮罩和稽核條件的組合。 物件還包含要套用規則的物件型別、可繼承規則的子物件型別、子物件如何繼承規則,以及如何傳用繼承的相關資訊。 + + + 初始化 類別的新執行個體。 + 要套用存取規則的識別 (Identity)。它必須是可以轉型為 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + 如果這個規則是從父容器繼承,則為 true。 + 指定存取規則的繼承 (Inheritance) 屬性。 + 是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 要套用規則的物件型別。 + 可繼承規則的子物件型別。 + 稽核條件。 + + 參數的值不能轉型成 ,或是 參數包含無效的值。 + + 參數的值為 0,或 參數包含無法辨認的旗標值。 + + + 取得可繼承 物件的子物件型別。 + 可繼承 物件的子物件型別。 + + + + 物件的 屬性包含有效值。 + + 會指定 屬性包含有效值。 會指定 屬性包含有效值。這些值可與邏輯 OR 組合。 + + + 取得要套用 的物件型別。 + 要套用 的物件型別。 + + + 提供無需直接管理存取控制清單 (ACL),即可控制對物件之存取的功能。這個類別是 類別的抽象基底類別。 + + + 初始化 類別的新執行個體。 + + + 初始化 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 如果新的 物件是目錄物件,則為 true。 + + + 初始化 類別的新執行個體。 + 執行個體的 。 + + + Gets the of the securable object associated with this object. + 與這個 物件相關聯的安全物件型別。 + + + 使用指定的值,初始化 類別的新執行個體。 + 這個方法建立的 物件。 + 要套用存取規則的識別 (Identity)。它必須是可以轉型為 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + 如果這個規則是從父容器繼承,則為 true。 + 指定存取規則的繼承 (Inheritance) 屬性。 + 指定是否要自動傳用繼承的存取規則。如果 設為 ,將略過傳用旗標。 + 指定有效的存取控制型別。 + + + 取得或設定布林值,指定是否已修改與這個 物件相關聯的存取規則。 + 如果已修改與這個 物件相關聯的存取規則,則為 true,否則為 false。 + + + Gets the of the object associated with the access rules of this object. 物件必須是可轉型為 物件的物件。 + 與這個 物件之存取規則相關聯的物件型別。 + + + 取得布林值,指定與這個 物件相關聯的存取規則是否為標準順序。 + 如果存取規則為標準順序,則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的 Discretionary 存取控制清單 (DACL) 是否受保護。 + 如果 DACL 受保護,則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的稽核規則是否為標準順序。 + 如果稽核規則為標準順序,則為 true,否則為 false。 + + + 取得布林值,指定與這個 物件相關聯的系統存取控制清單 (SACL) 是否受保護。 + 如果 SACL 受保護,則為 true,否則為 false。 + + + 使用指定的值,初始化 類別的新執行個體。 + 這個方法建立的 物件。 + 要套用稽核規則的識別。它必須是可以轉型為 的物件。 + 這個規則的存取遮罩。存取遮罩為 32 位元的匿名位元集合,其意義由個別的整合子定義。 + 如果這個規則是從父容器繼承,則為 true。 + 指定稽核規則的繼承屬性。 + 指定是否要自動傳用繼承的稽核規則。如果 設為 ,將略過傳用旗標。 + 指定稽核規則的條件。 + + + 取得或設定布林值,指定是否已修改與這個 物件相關聯的稽核規則。 + 如果已修改與這個 物件相關聯的稽核規則,則為 true,否則為 false。 + + + Gets the object associated with the audit rules of this object. 物件必須是可轉型為 物件的物件。 + 與這個 物件之稽核規則相關聯的物件型別。 + + + 取得與指定之擁有人相關聯的主要群組。 + 與指定之擁有人相關聯的主要群組。 + 要取得其主要群組的擁有人。 + + + + + + 取得與指定之主要群組相關聯的擁有人。 + 與指定之群組相關聯的擁有人。 + 要取得其擁有人的主要群組。 + + + + + + 傳回位元組值陣列,表示這個 物件的安全性描述元 (Security Descriptor) 資訊。 + 位元組值陣列,表示這個 物件的安全性描述元。如果這個 物件中沒有安全性資訊,則這個方法會傳回 null。 + + + 傳回與這個 物件相關聯之安全性描述元中指定區段的安全性描述元定義語言 (SDDL) 表示。 + 與這個 物件相關聯之安全性描述元中指定區段的 SDDL 表示。 + 指定要取得安全性描述元的哪個區段 (存取規則、稽核規則、主要群組或擁有人)。 + + + 取得或設定布林值 (Boolean),指定是否已修改與安全物件相關聯的群組。 + 如果已修改與安全物件相關聯的群組,則為 true,否則為 false。 + + + 取得布林值,指定這個 物件是否為容器物件。 + 如果 是容器物件,則為 true,否則為 false。 + + + 取得布林值,指定這個 物件是否為目錄物件。 + 如果 物件是目錄物件,則為 true,否則為 false。 + + + 傳回布林值,指定與這個 物件相關聯的安全性描述元是否可轉換為安全性描述元定義語言 (SDDL) 格式。 + 如果與這個 物件相關聯的安全性描述元可轉換為安全性描述元定義語言 (SDDL) 格式,則為 true,否則為 false。 + + + 將指定的修改套用至與這個 物件相關聯的 Discretionary 存取控制清單 (DACL)。 + 如果 DACL 修改成功,則為 true,否則為 false。 + 要套用至 DACL 的修改。 + 要修改的存取規則。 + 如果 DACL 修改成功,則為 true,否則為 false。 + + + 將指定的修改套用至與這個 物件相關聯的 Discretionary 存取控制清單 (DACL)。 + 如果 DACL 修改成功,則為 true,否則為 false。 + 要套用至 DACL 的修改。 + 要修改的存取規則。 + 如果 DACL 修改成功,則為 true,否則為 false。 + + + 將指定的修改套用至與這個 物件相關聯的系統存取控制清單 (SACL)。 + 如果 SACL 修改成功,則為 true,否則為 false。 + 要套用至 SACL 的修改。 + 要修改的稽核規則。 + 如果 SACL 修改成功,則為 true,否則為 false。 + + + 將指定的修改套用至與這個 物件相關聯的系統存取控制清單 (SACL)。 + 如果 SACL 修改成功,則為 true,否則為 false。 + 要套用至 SACL 的修改。 + 要修改的稽核規則。 + 如果 SACL 修改成功,則為 true,否則為 false。 + + + 取得或設定布林值,指定是否已修改安全物件的擁有人。 + 如果已修改安全物件的擁有人,則為 true,否則為 false。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱<備註>。 + true 表示啟用允許呼叫端取得物件擁有權的權限。 + 用於擷取保存之資訊的名稱。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱<備註>。 + 用於擷取保存之資訊的控制代碼。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + + + 將與此 物件相關聯之安全性描述元的指定區段,儲存至永久儲存區。我們建議您最好將 參數的值傳遞給建構函式,並將方法保存為相同的方法。如需詳細資訊,請參閱<備註>。 + 用於擷取保存之資訊的名稱。 + 其中一個 列舉值,指定要儲存之安全物件安全性描述元 (Security Descriptor) (存取規則、稽核規則、擁有人、主要群組) 的區段。 + + + 移除與指定之 相關聯的所有存取規則。 + 要移除所有存取規則的 。 + 並非所有存取規則都為標準順序。 + + + 移除與指定之 相關聯的所有稽核規則。 + 要移除所有稽核規則的 。 + 並非所有稽核規則都為標準順序。 + + + 鎖定這個 物件以進行讀取存取。 + + + 解除鎖定這個 物件以進行讀取存取。 + + + 設定或移除與這個 物件相關聯的存取規則保護。受保護的存取規則無法由父物件透過繼承進行修改。 + true 表示保護與這個 物件相關聯的存取規則,以避免繼承,而 false 則表示允許繼承。 + true 表示保留繼承的存取規則,而 false 則表示移除繼承的存取規則。如果 為 false,則忽略這個參數。 + 這個方法嘗試移除非標準 Discretionary 存取控制清單 (DACL) 的繼承規則。 + + + 設定或移除與這個 物件相關聯的稽核規則保護。受保護的稽核規則無法由父物件透過繼承進行修改。 + true 表示保護與這個 物件相關聯的稽核規則,以避免繼承,而 false 則表示允許繼承。 + true 表示保留繼承的稽核規則,而 false 則表示移除繼承的稽核規則。如果 為 false,則忽略這個參數。 + 這個方法嘗試移除非標準系統存取控制清單 (SACL) 的繼承規則。 + + + 設定與這個 物件相關聯之安全性描述元的主要群組。 + 要設定的主要群組。 + + + 設定與這個 物件相關聯之安全性描述元的擁有人。 + 要設定的擁有人。 + + + 在指定的位元組值陣列中,設定這個 物件的安全性描述元。 + 要從中設定安全性描述元的位元組陣列。 + + + 在指定的位元組值陣列中,設定這個 物件之安全性描述元的指定區段。 + 要從中設定安全性描述元的位元組陣列。 + 要設定的安全性描述元區段 (存取規則、稽核規則、擁有人或主要群組)。 + + + 在指定的安全性描述元定義語言 (SDDL) 字串中,設定這個 物件的安全性描述元。 + 要從中設定安全性描述元的 SDDL 字串。 + + + 在指定的安全性描述元定義語言 (SDDL) 字串中,設定這個 物件之安全性描述元的指定區段。 + 要從中設定安全性描述元的 SDDL 字串。 + 要設定的安全性描述元區段 (存取規則、稽核規則、擁有人或主要群組)。 + + + 鎖定這個 物件以進行寫入存取。 + + + 解除鎖定這個 物件以進行寫入存取。 + + + 提供不直接操作存取控制清單 (ACL) 即可控制對物件之存取的功能,同時也授與對存取權限進行類型轉換的能力。 + 物件的存取權限。 + + + 初始化 ObjectSecurity`1 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 資源的型別。 + + + 初始化 ObjectSecurity`1 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 資源的型別。 + 控制代碼。 + 要包含的區段。 + + + 初始化 ObjectSecurity`1 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 資源的型別。 + 控制代碼。 + 要包含的區段。 + 委派由提供自訂例外狀況的整合子實作。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 初始化 ObjectSecurity`1 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 資源的型別。 + 與新 物件相關聯之安全物件的名稱。 + 要包含的區段。 + + + 初始化 ObjectSecurity`1 類別的新執行個體。 + 如果新的 物件是容器 (Container) 物件,則為 true。 + 資源的型別。 + 與新 物件相關聯之安全物件的名稱。 + 要包含的區段。 + 委派由提供自訂例外狀況的整合子實作。 + 物件,包含關於例外狀況之來源或目的端的內容資訊。 + + + 取得與這個 ObjectSecurity`1 物件相關聯之安全物件的類型。 + 與目前執行個體相關聯的安全物件類型。 + + + 初始化 ObjectAccessRule 類別的新執行個體,這個執行個體表示相關聯安全物件的新存取控制規則。 + 表示指定之使用者的新存取控制規則,具有指定的存取權限、存取控制和旗標。 + 代表使用者帳戶。 + 存取類型。 + 如果繼承存取規則,則為 true,否則為 false。 + 指定如何將存取遮罩散佈到子物件。 + 指定如何將存取控制項目 (ACE) 傳用至子物件。 + 指定允許存取還是拒絕存取。 + + + 取得與這個 ObjectSecurity`1 物件之存取規則相關聯的物件類型。 + 與目前執行個體之存取規則相關聯的物件類型。 + + + 將指定的存取規則加入與這個 ObjectSecurity`1 物件相關聯的判別存取控制清單 (DACL)。 + 要加入的規則。 + + + 將指定的稽核規則加入與這個 ObjectSecurity`1 物件相關聯的系統存取控制清單 (SACL)。 + 要加入的稽核規則。 + + + 初始化 類別 (表示指定之使用者的指定稽核規則) 的新執行個體。 + 使用指定之使用者的指定稽核規則。 + 代表使用者帳戶。 + 整數,指定存取類型。 + 如果繼承存取規則,則為 true,否則為 false。 + 指定如何將存取遮罩散佈到子物件。 + 指定如何將存取控制項目 (ACE) 傳用至子物件。 + 描述要執行的稽核類型。 + + + 取得與這個 ObjectSecurity`1 物件之稽核規則相關聯的 Type 物件。 + 與目前執行個體之稽核規則相關聯的 Type 物件。 + + + 使用指定的控制代碼,將與此 ObjectSecurity`1 物件相關聯之安全性描述元儲存至永久儲存區。 + 與這個 ObjectSecurity`1 物件相關聯之安全物件的控制代碼。 + + + 使用指定的名稱,將與此 ObjectSecurity`1 物件相關聯之安全性描述元儲存至永久儲存區。 + 與這個 ObjectSecurity`1 物件相關聯之安全物件的名稱。 + + + 從與這個 ObjectSecurity`1 物件相關聯的判別存取控制清單 (DACL),移除與指定的存取規則包含相同安全識別項和存取遮罩的存取規則。 + 如果成功移除存取規則,則傳回 true,否則傳回 false。 + 要移除的規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯的判別存取控制清單 (DACL),移除與指定的存取規則具有相同安全識別項的所有存取規則。 + 要移除的存取規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯的判別存取控制清單 (DACL),移除與指定的存取規則完全相符的所有存取規則。 + 要移除的存取規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯的系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項和存取遮罩的稽核規則。 + 如果已移除指定的物件則傳回 true,否則傳回 false。 + 要移除的稽核規則 + + + 從與這個 ObjectSecurity`1 物件相關聯的系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項的所有稽核規則。 + 要移除的稽核規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯的系統存取控制清單 (SACL),移除與指定稽核規則完全相符的所有稽核規則。 + 要移除的稽核規則。 + + + 移除與這個 ObjectSecurity`1 物件相關聯之判別存取控制清單 (DACL) 中的所有存取規則,然後加入指定的存取規則。 + 要重設的存取規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯之判別存取控制清單 (DACL),移除與指定的存取規則包含相同安全識別項和限定詞的所有存取規則,然後加入指定的存取規則。 + 要設定的存取規則。 + + + 從與這個 ObjectSecurity`1 物件相關聯之系統存取控制清單 (SACL),移除與指定的稽核規則包含相同安全識別項和限定詞的所有稽核規則,然後加入指定的稽核規則。 + 要設定的稽核規則。 + + + 命名空間中的方法嘗試啟用本身沒有的權限時,所擲回的例外狀況。 + + + 初始化 類別的新執行個體。 + + + 使用指定的權限,初始化 類別的新執行個體。 + 未啟用的權限。 + + + 使用指定的例外狀況,初始化 類別的新執行個體。 + 未啟用的權限。 + 導致目前例外狀況的例外。如果 參數不是 Null 參考 (在 Visual Basic 中為 Nothing),則會在處理內部例外的 catch 區塊中引發目前的例外狀況。 + + + 取得未啟用之權限的名稱。 + 方法無法啟用之權限的名稱。 + + + 指定如何將存取控制項目 (ACE) 傳用至子物件。只有存在繼承 (Inheritance) 旗標時,這些旗標才有意義。 + + + 指定 ACE 只傳用至子物件。這同時包含容器和分葉子物件。 + + + 指定未設定繼承旗標。 + + + 指定 ACE 不傳用至子物件。 + + + 表示包含限定詞 (Qualifier) 的存取控制項目 (ACE)。由 物件表示的限定詞,指定 ACE 是允許存取、拒絕存取、引起系統稽核還是引起系統警示。 類別是 類別的抽象基底類別。 + + + 取得值,指定 ACE 是允許存取、拒絕存取、引起系統稽核還是引起系統警示。 + 值,指定 ACE 是允許存取、拒絕存取、引起系統稽核還是引起系統警示。 + + + 傳回與這個 物件相關聯的不透明回呼資料。 + 位元組值陣列,表示與這個 物件相關聯的不透明回呼資料。 + + + 指定這個 物件是否包含回呼 (Callback) 資料。 + 如果這個 物件包含回呼資料則為 true,否則為 false。 + + + 取得與這個 物件相關聯的不透明回呼 (Callback) 資料長度。這個屬性只對回呼存取控制項目 (ACE) 有效。 + 不透明回呼 (Callback) 資料的長度。 + + + 設定與這個 物件相關聯的不透明回呼資料。 + 位元組值陣列,表示這個 物件的不透明回呼資料。 + + + 表示存取控制清單 (ACL)。 + + + 使用指定的修訂層級,初始化 類別的新執行個體。 + 新存取控制清單 (ACL) 的修訂層級。 + 這個 物件可以包含的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 從指定的二進位格式,初始化 類別的新執行個體。 + 表示存取控制清單 (ACL) 的位元組值陣列。 + + 參數中開始解封送處理 (Unmarshaling) 資料的位移。 + + + 取得目前 物件的二進位表示長度 (以位元組為單位)。使用 方法,將 ACL 封送處理 (Marshaling) 至二進位陣列之前,應使用這個長度。 + 目前 物件的二進位表示長度 (以位元組為單位)。 + + + 取得目前 物件中的存取控制項目 (ACE) 數目。 + 目前 物件中的 ACE 數目。 + + + 物件的內容封送處理到開始於指定位移的指定位元組陣列。 + 位元組陣列, 的內容會封送處理至此陣列。 + 要開始封送處理的位移。 + + 為負值,或是過大而無法將整個 複製到 + + + 在指定之索引處插入指定的存取控制項目 (ACE)。 + 要加入新 ACE 的位置。您可以指定 屬性的值,以在 物件的結尾插入 ACE。 + 要插入的 ACE。 + + 為負值,或是過大而無法將整個 複製到 + + + 取得或設定指定之索引處的存取控制項目 (ACE)。 + 在指定索引處的 ACE。 + 要取得或設定 ACE 之以零起始的索引。 + + + 移除指定之位置的存取控制項目 (ACE)。 + 要移除 ACE 之以零起始的索引。 + + 參數的值大於 屬性的值減去一或是負值。 + + + 取得 的修訂層級。 + 位元組值,指定 的修訂層級。 + + + 表示安全性描述元 (Security Descriptor)。安全性描述元包括擁有人、主要群組、Discretionary 存取控制清單 (DACL) 和系統存取控制清單 (SACL)。 + + + 從指定的位元組值陣列,初始化 類別的新執行個體。 + 位元組值陣列,從其中建立新的 物件。 + + 陣列中開始複製的位移。 + + + 使用指定的值,初始化 類別的新執行個體。 + 旗標,指定新 物件的行為。 + 物件擁有人。 + 物件的主要群組。 + 物件的系統存取控制清單 (SACL)。 + 物件的 Discretionary 存取控制清單 (DACL)。 + + + 從指定的安全性描述元定義語言 (SDDL) 字串,初始化 類別的新執行個體。 + SDDL 字串,從其中建立新的 物件。 + + + 取得指定 物件之行為的值。 + 與邏輯 OR 運算結合的一或多個 列舉型別的值。 + + + 取得或設定這個 物件的 Discretionary 存取控制清單 (DACL)。DACL 包含存取規則。 + 這個 物件的 DACL。 + + + 取得或設定這個 物件的主要群組。 + 這個 物件的主要群組。 + + + 取得或設定與這個 物件相關聯的物件擁有人。 + 與這個 物件相關聯的物件擁有人。 + + + 取得或設定位元組值,表示與這個 物件相關聯的資源管理員控制位元。 + 位元組值,表示與這個 物件相關聯的資源管理員控制位元。 + + + 將這個 物件的 屬性設為指定值。 + 與邏輯 OR 運算結合的一或多個 列舉型別的值。 + + + 取得或設定這個 物件的系統存取控制清單 (SACL)。SACL 包含稽核規則。 + 這個 物件的 SACL。 + + + 指定定義的原生 (Native) 物件型別。 + + + 目錄服務 (DS) 物件或目錄服務物件的屬性集 (Property Set) 或屬性。 + + + 目錄服務物件及其所有屬性集和屬性。 + + + 檔案或目錄。 + + + 本機核心物件。 + + + 網路共用。 + + + 印表機。 + + + 提供者定義的物件。 + + + 登錄機碼 (Registry Key)。 + + + WOW64 下的登錄項目物件。 + + + Windows 服務。 + + + 未知的物件型別。 + + + 本機電腦上的視窗工作站或桌面物件。 + + + Windows Management Instrumentation (WMI) 物件。 + + + 指定要查詢或設定的安全性描述元 (Security Descriptor) 區段。 + + + 指定 Discretionary 存取控制清單 (DACL)。 + + + 指定主要群組識別項。 + + + 指定擁有人識別項。 + + + 指定系統存取控制名單 (SACL)。 + + + 表示系統存取控制清單 (SACL)。 + + + 使用指定的值,初始化 類別的新執行個體。 + 如果新的 物件是容器,則為 true。 + 如果新的 物件是目錄物件存取控制清單 (ACL),則為 true。 + 物件的修訂層級。 + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 使用指定的值,初始化 類別的新執行個體。 + 如果新的 物件是容器,則為 true。 + 如果新的 物件是目錄物件存取控制清單 (ACL),則為 true。 + 物件可以容納的存取控制項目 (ACE) 數。這個數字只做為提示之用。 + + + 使用指定的 物件中的指定值,初始化 類別的新執行個體。 + 如果新的 物件是容器,則為 true。 + 如果新的 物件是目錄物件存取控制清單 (ACL),則為 true。 + 物件的基礎 物件。您可以指定 null 以建立空的 ACL。 + + + 將稽核規則加入目前 物件。 + 要加入的稽核規則型別。 + 要加入稽核規則的 。 + 新稽核規則的存取遮罩。 + 旗標,指定新稽核規則的繼承屬性。 + 旗標,指定新稽核規則的繼承傳用屬性。 + + + 將具有指定設定的稽核規則加入目前 物件。為新的稽核規則指定物件型別或繼承的物件型別時,您可以將這個方法用於目錄物件存取控制清單 (ACL)。 + 要加入的稽核規則型別。 + 要加入稽核規則的 。 + 新稽核規則的存取遮罩。 + 旗標,指定新稽核規則的繼承屬性。 + 旗標,指定新稽核規則的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用新稽核規則之物件類別的識別。 + 可繼承新稽核規則之子物件類別的識別。 + + + 將稽核規則加入目前 物件。 + 要加入稽核規則的 。 + + 新稽核規則。 + + + 從目前的 物件移除指定的稽核規則。 + 如果這個方法成功移除指定的稽核規則,則為 true,否則為 false。 + 要移除的稽核規則型別。 + 要移除稽核規則的 。 + 要移除之規則的存取遮罩。 + 旗標,指定要移除之規則的繼承屬性。 + 旗標,指定要移除之規則的繼承傳用屬性。 + + + 從目前的 物件移除指定的稽核規則。指定物件型別或繼承物件型別時,將這個方法用於目錄物件存取控制清單 (ACL)。 + 如果這個方法成功移除指定的稽核規則,則為 true,否則為 false。 + 要移除的稽核規則型別。 + 要移除稽核規則的 。 + 要移除之規則的存取遮罩。 + 旗標,指定要移除之規則的繼承屬性。 + 旗標,指定要移除之規則的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用移除之稽核控制規則的物件類別識別。 + 可繼承移除之稽核規則的子物件類別識別。 + + + 從目前的 物件移除指定的稽核規則。 + 如果這個方法成功移除指定的稽核規則,則為 true,否則為 false。 + 要移除稽核規則的 。 + 要移除稽核規則的 。 + + + 從目前的 物件移除指定的稽核規則。 + 要移除的稽核規則型別。 + 要移除稽核規則的 。 + 要移除之規則的存取遮罩。 + 旗標,指定要移除之規則的繼承屬性。 + 旗標,指定要移除之規則的繼承傳用屬性。 + + + 從目前的 物件移除指定的稽核規則。指定物件型別或繼承物件型別時,將這個方法用於目錄物件存取控制清單 (ACL)。 + 要移除的稽核規則型別。 + 要移除稽核規則的 。 + 要移除之規則的存取遮罩。 + 旗標,指定要移除之規則的繼承屬性。 + 旗標,指定要移除之規則的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用移除之稽核控制規則的物件類別識別。 + 可繼承移除之稽核規則的子物件類別識別。 + + + 從目前的 物件移除指定的稽核規則。 + 要移除稽核規則的 。 + + 要移除的規則。 + + + 為指定的 物件設定指定的稽核規則。 + 要設定的稽核條件。 + 要設定稽核規則的 。 + 新稽核規則的存取遮罩。 + 旗標,指定新稽核規則的繼承屬性。 + 旗標,指定新稽核規則的繼承傳用屬性。 + + + 為指定的 物件設定指定的稽核規則。指定物件型別或繼承物件型別時,將這個方法用於目錄物件存取控制清單 (ACL)。 + 要設定的稽核條件。 + 要設定稽核規則的 。 + 新稽核規則的存取遮罩。 + 旗標,指定新稽核規則的繼承屬性。 + 旗標,指定新稽核規則的繼承傳用屬性。 + 旗標,指定 參數是否包含非 null 值。 + 要套用新稽核規則之物件類別的識別。 + 可繼承新稽核規則之子物件類別的識別。 + + + 為指定的 物件設定指定的稽核規則。 + 要設定稽核規則的 。 + 要設定稽核規則的 。 + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.dll new file mode 100644 index 0000000..6908632 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/ref/netstandard2.0/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/ref/uap10.0.16299/_._ b/packages/System.Security.AccessControl.4.7.0/ref/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net46/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net46/System.Security.AccessControl.dll new file mode 100644 index 0000000..ea65f02 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net46/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.dll new file mode 100644 index 0000000..752972c Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/net461/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.dll new file mode 100644 index 0000000..53a373f Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.xml b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.xml new file mode 100644 index 0000000..35d16eb --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.AccessControl.xml @@ -0,0 +1,2046 @@ + + + + System.Security.AccessControl + + + + Specifies the actions that are permitted for securable objects. + + + Specifies write-only access. + + + Specifies no access. + + + Specifies read-only access. + + + Specifies the type of access control modification to perform. This enumeration is used by methods of the class and its descendents. + + + Add the specified authorization rule to the access control list (ACL). + + + Remove authorization rules that contain the same security identifier (SID) and access mask as the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL. + + + Remove authorization rules that exactly match the specified authorization rule from the ACL. + + + Remove authorization rules that contain the same SID as the specified authorization rule from the ACL, and then add the specified authorization rule to the ACL. + + + Remove all authorization rules from the ACL, then add the specified authorization rule to the ACL. + + + Specifies which sections of a security descriptor to save or load. + + + The discretionary access control list (DACL). + + + The entire security descriptor. + + + The system access control list (SACL). + + + The primary group. + + + No sections. + + + The owner. + + + Specifies whether an object is used to allow or deny access. These values are not flags, and they cannot be combined. + + + The object is used to allow access to a secured object. + + + The object is used to deny access to a secured object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the value associated with this object. + The value associated with this object. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An AccessRule`1 object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated. + The access rights type for the access rule. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The valid access control type. + + + Initializes a new instance of the AccessRule'1 class by using the specified values. + The identity to which the access rule applies. + The rights of the access rule. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The valid access control type. + + + Gets the rights of the current instance. + The rights, cast as type <T>, of the current instance. + + + Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL). + + + Gets the current element in the collection. This property gets the type-friendly version of the object. + The current element in the collection. + + + Advances the enumerator to the next element of the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + The collection was modified after the enumerator was created. + + + Sets the enumerator to its initial position, which is before the first element in the collection. + The collection was modified after the enumerator was created. + + + Gets the current element in the collection. + The current element in the collection. + The collection was modified after the enumerator was created. + + + Specifies the inheritance and auditing behavior of an access control entry (ACE). + + + All access attempts are audited. + + + The access mask is propagated to child container objects. + + + Failed access attempts are audited. + + + A logical of , , , and . + + + An ACE is inherited from a parent container rather than being explicitly set for an object. + + + The access mask is propagated only to child objects. This includes both container and leaf child objects. + + + No ACE flags are set. + + + The access checks do not apply to the object; they only apply to its children. + + + The access mask is propagated onto child leaf objects. + + + Successful access attempts are audited. + + + Specifies the function of an access control entry (ACE). + + + Allow access. + + + Deny access. + + + Cause a system alarm. + + + Cause a system audit. + + + Defines the available access control entry (ACE) types. + + + Allows access to an object for a specific trustee identified by an object. + + + Allows access to an object for a specific trustee identified by an object. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type may contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Defined but never used. Included here for completeness. + + + Allows access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Denies access to an object for a specific trustee identified by an object. + + + Denies access to an object for a specific trustee identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Denies access to an object, property set, or property. The ACE contains a set of access rights, a GUID that identifies the type of object, and an object that identifies the trustee to whom the system will grant access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Tracks the maximum defined ACE type in the enumeration. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Reserved for future use. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object. The trustee is identified by an object. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. This ACE type can contain optional callback data. The callback data is a resource manager-specific BLOB that is not interpreted. + + + Causes an audit message to be logged when a specified trustee attempts to gain access to an object or subobjects such as property sets or properties. The ACE contains a set of access rights, a GUID that identifies the type of object or subobject, and an object that identifies the trustee for whom the system will audit access. The ACE also contains a GUID and a set of flags that control inheritance of the ACE by child objects. + + + Specifies the conditions for auditing attempts to access a securable object. + + + Failed access attempts are to be audited. + + + No access attempts are to be audited. + + + Successful access attempts are to be audited. + + + Represents a combination of a user's identity and an access mask. An object also contains information about how the rule is inherited by child objects, how that inheritance is propagated, and for what conditions it is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + The conditions for which the rule is audited. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the audit flags for this audit rule. + A bitwise combination of the enumeration values. This combination specifies the audit conditions for this audit rule. + + + Represents a combination of a user's identity and an access mask. + The type of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which this audit rule applies. + The rights of the audit rule. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The properties of the audit rule. + + + Initializes a new instance of the class by using the specified values. + The identity to which the audit rule applies. + The rights of the audit rule. + The inheritance properties of the audit rule. + Whether inherited audit rules are automatically propagated. + The conditions for which the rule is audited. + + + Gets the rights of the audit rule. + The rights of the audit rule. + + + Determines access to securable objects. The derived classes and offer specializations for access and audit functionality. + + + Initializes a new instance of the class by using the specified values. + The identity to which the access rule applies. This parameter must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + to inherit this rule from a parent container. + The inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The value of the parameter cannot be cast as a . + The value of the parameter is zero, or the or parameters contain unrecognized flag values. + + + Gets the access mask for this rule. + The access mask for this rule. + + + Gets the to which this rule applies. + The to which this rule applies. + + + Gets the value of flags that determine how this rule is inherited by child objects. + A bitwise combination of the enumeration values. + + + Gets a value indicating whether this rule is explicitly set or is inherited from a parent container object. + + if this rule is not explicitly set but is instead inherited from a parent container. + + + Gets the value of the propagation flags, which determine how inheritance of this rule is propagated to child objects. This property is significant only when the value of the enumeration is not . + A bitwise combination of the enumeration values. + + + Represents a collection of objects. + + + Initializes a new instance of the class. + + + Adds an object to the collection. + The object to add to the collection. + + + Copies the contents of the collection to an array. + An array to which to copy the contents of the collection. + The zero-based index from which to begin copying. + + + Gets the object at the specified index of the collection. + The zero-based index of the object to get. + The object at the specified index. + + + Represents an access control entry (ACE). + + + Initializes a new instance of the class. + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new access control entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + + to specify that the new ACE is a callback type ACE. + Opaque data associated with the new ACE. Opaque data is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. Use this length with the method before marshaling the ACL into a binary array. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the object is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into the array. + + + Gets the maximum allowed length of an opaque data BLOB for callback access control entries (ACEs). + + to specify that the object is a callback ACE type. + The allowed length of an opaque data BLOB. + + + Represents an access control list (ACL) and is the base class for the and classes. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the access control list (ACL) into a binary array by using the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + + Gets a Boolean value that specifies whether the access control entries (ACEs) in the current object are in canonical order. + + if the ACEs in the current object are in canonical order; otherwise, . + + + Sets whether the object is a container. + + if the current object is a container. + + + Sets whether the current object is a directory object access control list (ACL). + + if the current object is a directory object ACL. + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + Removes all access control entries (ACEs) contained by this object that are associated with the specified object. + The object to check for. + + + Removes all inherited access control entries (ACEs) from this object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Controls access to objects without direct manipulation of access control lists (ACLs). This class is the abstract base class for the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this object. + The access rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this object. + The audit rule to add. + + + Gets a collection of the access rules associated with the specified security identifier. + + to include access rules explicitly set for the object. + + to include inherited access rules. + Specifies whether the security identifier for which to retrieve access rules is of type T:System.Security.Principal.SecurityIdentifier or type T:System.Security.Principal.NTAccount. The value of this parameter must be a type that can be translated to the type. + The collection of access rules associated with the specified object. + + + Gets a collection of the audit rules associated with the specified security identifier. + + to include audit rules explicitly set for the object. + + to include inherited audit rules. + The security identifier for which to retrieve audit rules. This must be an object that can be cast as a object. + The collection of audit rules associated with the specified object. + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + if the audit rule was successfully removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this object and then adds the specified audit rule. + The audit rule to set. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class from the specified information. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified object. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The object from which to create the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + + if the new security descriptor is associated with a container object. + + if the new security descriptor is associated with a directory object. + The SDDL string from which to create the new object. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Sets the property for this instance and sets the flag. + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number should only be used as a hint. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the discretionary access control list (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets a Boolean value that specifies whether the object associated with this object is a container object. + + if the object associated with this object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is in canonical order. + + if the DACL associated with this object is in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the object associated with this object is a directory object. + + if the object associated with this object is a directory object; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is in canonical order. + + if the SACL associated with this object is in canonical order; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Removes all access rules for the specified security identifier from the Discretionary Access Control List (DACL) associated with this object. + The security identifier for which to remove access rules. + + + Removes all audit rules for the specified security identifier from the System Access Control List (SACL) associated with this object. + The security identifier for which to remove audit rules. + + + Sets the inheritance protection for the Discretionary Access Control List (DACL) associated with this object. DACLs that are protected do not inherit access rules from parent containers. + + to protect the DACL from inheritance. + + to keep inherited access rules in the DACL; to remove inherited access rules from the DACL. + + + Sets the inheritance protection for the System Access Control List (SACL) associated with this object. SACLs that are protected do not inherit audit rules from parent containers. + + to protect the SACL from inheritance. + + to keep inherited audit rules in the SACL; to remove inherited audit rules from the SACL. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Represents a compound Access Control Entry (ACE). + + + Initializes a new instance of the class. + Contains flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The access mask for the ACE. + A value from the enumeration. + The associated with the new ACE. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets or sets the type of this object. + The type of this object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Specifies the type of a object. + + + The object is used for impersonation. + + + These flags affect the security descriptor behavior. + + + Specifies that the Discretionary Access Control List (DACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the DACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the DACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Ignored. + + + Specifies that the group was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + No control flags. + + + Specifies that the owner was obtained by a defaulting mechanism. Set by resource managers only; should not be set by callers. + + + Specifies that the contents of the Reserved field are valid. + + + Specifies that the security descriptor binary representation is in the self-relative format. This flag is always set. + + + Ignored. + + + Specifies that the System Access Control List (SACL) has been automatically inherited from the parent. Set by resource managers only. + + + Ignored. + + + Specifies that the SACL was obtained by a defaulting mechanism. Set by resource managers only. + + + Specifies that the SACL is not . Set by resource managers or users. + + + Specifies that the resource manager prevents auto-inheritance. Set by resource managers or users. + + + Represents an Access Control Entry (ACE) that is not defined by one of the members of the enumeration. + + + Initializes a new instance of the class. + Type of the new Access Control Entry (ACE). This value must be greater than . + Flags that specify information about the inheritance, inheritance propagation, and auditing conditions for the new ACE. + An array of byte values that contains the data for the new ACE. This value can be . The length of this array must not be greater than the value of the field, and must be a multiple of four. + The value of the parameter is not greater than or the length of the array is either greater than the value of the field or not a multiple of four. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the opaque data associated with this object. + An array of byte values that represents the opaque data associated with this object. + + + Returns the maximum allowed length of an opaque data blob for this object. + + + Gets the length of the opaque data associated with this object. + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents a Discretionary Access Control List (DACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new ACE. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Adds an Access Control Entry (ACE) with the specified settings to the current object. + The type of access control (allow or deny) to add. + The for which to add an ACE. + The for the new access. + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The access mask for the access control rule to be removed. + Flags that specify the inheritance properties of the access control rule to be removed. + Flags that specify the inheritance propagation properties for the access control rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed access control rule applies. + The identity of the class of child objects which can inherit the removed access control rule. + + if this method successfully removes the specified access; otherwise, . + + + Removes the specified access control rule from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an access control rule. + The for which to remove access. + Returns . + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + + + Removes the specified Access Control Entry (ACE) from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the ACE to be removed. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The access mask for the ACE to be removed. + Flags that specify the inheritance properties of the ACE to be removed. + Flags that specify the inheritance propagation properties for the ACE to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed ACE applies. + The identity of the class of child objects which can inherit the removed ACE. + + + Removes the specified Access Control Entry (ACE) from the current object. + The type of access control (allow or deny) to remove. + The for which to remove an ACE. + The for which to remove access. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The access rule for the new ACE. + Flags that specify the inheritance properties of the new ACE. + Flags that specify the inheritance propagation properties for the new ACE. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new ACE applies. + The identity of the class of child objects which can inherit the new ACE. + + + Sets the specified access control for the specified object. + The type of access control (allow or deny) to set. + The for which to set an ACE. + The for which to set access. + + + Represents an Access Control Entry (ACE), and is the base class for all other ACE classes. + + + Gets or sets the associated with this object. + The associated with this object. + + + Gets the type of this Access Control Entry (ACE). + The type of this ACE. + + + Gets the audit information associated with this Access Control Entry (ACE). + The audit information associated with this Access Control Entry (ACE). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Creates a deep copy of this Access Control Entry (ACE). + The object that this method creates. + + + Creates a object from the specified binary data. + The binary data from which to create the new object. + The offset at which to begin unmarshaling. + The object this method creates. + + + Determines whether the specified object is equal to the current object. + The object to compare to the current object. + + if the specified object is equal to the current object; otherwise, . + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Serves as a hash function for the class. The method is suitable for use in hashing algorithms and data structures like a hash table. + A hash code for the current object. + + + Gets flags that specify the inheritance properties of this Access Control Entry (ACE). + Flags that specify the inheritance properties of this ACE. + + + Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly. + + if this ACE is inherited; otherwise, . + + + Determines whether the specified objects are considered equal. + The first object to compare. + The second to compare. + + if the two objects are equal; otherwise, . + + + Determines whether the specified objects are considered unequal. + The first object to compare. + The second to compare. + + if the two objects are unequal; otherwise, . + + + Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). + Flags that specify the inheritance propagation properties of this ACE. + + + Represents an access control list (ACL) and is the base class for the , , , and classes. + + + Initializes a new instance of the class. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are not associated with Directory Services objects. + + + The revision level of the current . This value is returned by the property for Access Control Lists (ACLs) that are associated with Directory Services objects. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Retrieves an object that you can use to iterate through the access control entries (ACEs) in an access control list (ACL). + An enumerator object. + + + This property is always set to . It is implemented only because it is required for the implementation of the interface. + Always . + + + Gets or sets the at the specified index. + The zero-based index of the to get or set. + The at the specified index. + + + The maximum allowed binary length of a object. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + This property always returns . It is implemented only because it is required for the implementation of the interface. + Always returns . + + + Copies each of the current into the specified array. + The array into which copies of the objects contained by the current are placed. + The zero-based index of where the copying begins. + + + Returns a new instance of the class cast as an instance of the interface. + A new object, cast as an instance of the interface. + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Returns an array of byte values that represents the information contained in this object. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor that this object represents. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Returns a boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets the revision level of the object. + A byte value that specifies the revision level of the . + + + Inheritance flags specify the semantics of inheritance for access control entries (ACEs). + + + The ACE is inherited by child container objects. + + + The ACE is not inherited by child objects. + + + The ACE is inherited by child leaf objects. + + + Encapsulates all Access Control Entry (ACE) types currently defined by Microsoft Corporation. All objects contain a 32-bit access mask and a object. + + + Gets or sets the access mask for this object. + The access mask for this object. + + + Gets or sets the object associated with this object. + The object associated with this object. + + + Provides the ability to control access to native objects without direct manipulation of Access Control Lists (ACLs). Native object types are defined by the enumeration. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The handle of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class by using the specified values. + + if the new object is a container object. + The type of securable object with which the new object is associated. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + + + Initializes a new instance of the class with the specified values. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + if the new object is a container object. + The type of securable object with which the new object is associated. + The name of the securable object with which the new object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to include in this object. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Provides a way for integrators to map numeric error codes to specific exceptions that they create. + The numeric error code. + The name of the securable object with which the object is associated. + The handle of the securable object with which the object is associated. + An object that contains contextual information about the source or destination of the exception. + The this delegate creates. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend.persist that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name of the securable object with which this object is associated. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + An object that contains contextual information about the source or destination of the exception. + The securable object with which this object is associated is either a directory or a file, and that directory or file could not be found. + + + Represents a combination of a user's identity, an access mask, and an access control type (allow or deny). An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + Specifies whether this rule allows or denies access. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + Gets flags that specify if the and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Controls access to Directory Services objects. This class represents an Access Control Entry (ACE) associated with a directory object. + + + Initiates a new instance of the class. + The inheritance, inheritance propagation, and auditing conditions for the new Access Control Entry (ACE). + The use of the new ACE. + The access mask for the ACE. + The associated with the new ACE. + Whether the and parameters contain valid object GUIDs. + A GUID that identifies the object type to which the new ACE applies. + A GUID that identifies the object type that can inherit the new ACE. + + if the new ACE is a callback type ACE. + Opaque data associated with the new ACE. This is allowed only for callback ACE types. The length of this array must not be greater than the return value of the method. + The qualifier parameter contains an invalid value or the length of the value of the opaque parameter is greater than the return value of the method. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + The GUID of the object type that can inherit the Access Control Entry (ACE) that this object represents. + + + Returns the maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + True if the is a callback ACE type. + The maximum allowed length, in bytes, of an opaque data BLOB for callback Access Control Entries (ACEs). + + + Gets or sets flags that specify whether the and properties contain values that identify valid object types. + On or more members of the enumeration combined with a logical OR operation. + + + Gets or sets the GUID of the object type associated with this object. + The GUID of the object type associated with this object. + + + Specifies the presence of object types for Access Control Entries (ACEs). + + + The type of object that can inherit the ACE. + + + No object types are present. + + + The type of object that is associated with the ACE is present. + + + Represents a combination of a user's identity, an access mask, and audit conditions. An object also contains information about the type of object to which the rule applies, the type of child object that can inherit the rule, how the rule is inherited by child objects, and how that inheritance is propagated. + + + Initializes a new instance of the class. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + The type of object to which the rule applies. + The type of child object that can inherit the rule. + The audit conditions. + The value of the parameter cannot be cast as a , or the parameter contains an invalid value. + The value of the parameter is 0, or the or parameters contain unrecognized flag values. + + + Gets the type of child object that can inherit the object. + The type of child object that can inherit the object. + + + + and properties of the object contain valid values. + + specifies that the property contains a valid value. specifies that the property contains a valid value. These values can be combined with a logical OR. + + + Gets the type of object to which the applies. + The type of object to which the applies. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs). This class is the abstract base class for the and classes. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + + if the new object is a container object. + True if the new object is a directory object. + + + Initializes a new instance of the class. + The of the new instance. + + + Gets the of the securable object associated with this object. + The type of the securable object associated with this object. + + + Initializes a new instance of the class with the specified values. + The identity to which the access rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + true if this rule is inherited from a parent container. + Specifies the inheritance properties of the access rule. + Specifies whether inherited access rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the valid access control type. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the access rules associated with this object have been modified. + + if the access rules associated with this object have been modified; otherwise, . + + + Gets the of the object associated with the access rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the access rules of this object. + + + Gets a Boolean value that specifies whether the access rules associated with this object are in canonical order. + + if the access rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the Discretionary Access Control List (DACL) associated with this object is protected. + + if the DACL is protected; otherwise, . + + + Gets a Boolean value that specifies whether the audit rules associated with this object are in canonical order. + + if the audit rules are in canonical order; otherwise, . + + + Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this object is protected. + + if the SACL is protected; otherwise, . + + + Initializes a new instance of the class with the specified values. + The identity to which the audit rule applies. It must be an object that can be cast as a . + The access mask of this rule. The access mask is a 32-bit collection of anonymous bits, the meaning of which is defined by the individual integrators. + + if this rule is inherited from a parent container. + Specifies the inheritance properties of the audit rule. + Specifies whether inherited audit rules are automatically propagated. The propagation flags are ignored if is set to . + Specifies the conditions for which the rule is audited. + The object that this method creates. + + + Gets or sets a Boolean value that specifies whether the audit rules associated with this object have been modified. + + if the audit rules associated with this object have been modified; otherwise, . + + + Gets the object associated with the audit rules of this object. The object must be an object that can be cast as a object. + The type of the object associated with the audit rules of this object. + + + Gets the primary group associated with the specified owner. + The owner for which to get the primary group. + The primary group associated with the specified owner. + + + Gets the owner associated with the specified primary group. + The primary group for which to get the owner. + The owner associated with the specified group. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an array of byte values that represents the security descriptor information for this object. + An array of byte values that represents the security descriptor for this object. This method returns if there is no security information in this object. + + + Returns the Security Descriptor Definition Language (SDDL) representation of the specified sections of the security descriptor associated with this object. + Specifies which sections (access rules, audit rules, primary group, owner) of the security descriptor to get. + The SDDL representation of the specified sections of the security descriptor associated with this object. + + + Gets or sets a Boolean value that specifies whether the group associated with the securable object has been modified. + + if the group associated with the securable object has been modified; otherwise, . + + + Gets a Boolean value that specifies whether this object is a container object. + + if the object is a container object; otherwise, . + + + Gets a Boolean value that specifies whether this object is a directory object. + + if the object is a directory object; otherwise, . + + + Returns a Boolean value that specifies whether the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format. + + if the security descriptor associated with this object can be converted to the Security Descriptor Definition Language (SDDL) format; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the Discretionary Access Control List (DACL) associated with this object. + The modification to apply to the DACL. + The access rule to modify. + + if the DACL is successfully modified; otherwise, . + + if the DACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Applies the specified modification to the System Access Control List (SACL) associated with this object. + The modification to apply to the SACL. + The audit rule to modify. + + if the SACL is successfully modified; otherwise, . + + if the SACL is successfully modified; otherwise, . + + + Gets or sets a Boolean value that specifies whether the owner of the securable object has been modified. + + if the owner of the securable object has been modified; otherwise, . + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + + to enable the privilege that allows the caller to take ownership of the object. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The handle used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Saves the specified sections of the security descriptor associated with this object to permanent storage. We recommend that the values of the parameters passed to the constructor and persist methods be identical. + The name used to retrieve the persisted information. + One of the enumeration values that specifies the sections of the security descriptor (access rules, audit rules, owner, primary group) of the securable object to save. + + + Removes all access rules associated with the specified . + The for which to remove all access rules. + All access rules are not in canonical order. + + + Removes all audit rules associated with the specified . + The for which to remove all audit rules. + All audit rules are not in canonical order. + + + Locks this object for read access. + + + Unlocks this object for read access. + + + Gets the security descriptor for this instance. + The security descriptor for this instance. + + + Sets or removes protection of the access rules associated with this object. Protected access rules cannot be modified by parent objects through inheritance. + + to protect the access rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited access rules; to remove inherited access rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical Discretionary Access Control List (DACL). + + + Sets or removes protection of the audit rules associated with this object. Protected audit rules cannot be modified by parent objects through inheritance. + + to protect the audit rules associated with this object from inheritance; to allow inheritance. + + to preserve inherited audit rules; to remove inherited audit rules. This parameter is ignored if is . + This method attempts to remove inherited rules from a non-canonical System Access Control List (SACL). + + + Sets the primary group for the security descriptor associated with this object. + The primary group to set. + + + Sets the owner for the security descriptor associated with this object. + The owner to set. + + + Sets the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified array of byte values. + The array of bytes from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Sets the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + + + Sets the specified sections of the security descriptor for this object from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to set the security descriptor. + The sections (access rules, audit rules, owner, primary group) of the security descriptor to set. + + + Locks this object for write access. + + + Unlocks this object for write access. + + + Provides the ability to control access to objects without direct manipulation of Access Control Lists (ACLs); also grants the ability to type-cast access rights. + The access rights for the object. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + A handle. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + + + Initializes a new instance of the ObjectSecurity`1 class. + + if the new object is a container object. + The type of resource. + The name of the securable object with which the new object is associated. + The sections to include. + A delegate implemented by integrators that provides custom exceptions. + An object that contains contextual information about the source or destination of the exception. + + + Gets the Type of the securable object associated with this ObjectSecurity`1 object. + The type of the securable object associated with the current instance. + + + Initializes a new instance of the ObjectAccessRule class that represents a new access control rule for the associated security object. + Represents a user account. + The access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Specifies whether access is allowed or denied. + Represents a new access control rule for the specified user, with the specified access rights, access control, and flags. + + + Gets the Type of the object associated with the access rules of this ObjectSecurity`1 object. + The Type of the object associated with the access rules of the current instance. + + + Adds the specified access rule to the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to add. + + + Adds the specified audit rule to the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to add. + + + Initializes a new instance of the class representing the specified audit rule for the specified user. + Represents a user account. + An integer that specifies an access type. + + if the access rule is inherited; otherwise, . + Specifies how to propagate access masks to child objects. + Specifies how to propagate Access Control Entries (ACEs) to child objects. + Describes the type of auditing to perform. + The specified audit rule for the specified user. + + + Gets the Type object associated with the audit rules of this ObjectSecurity`1 object. + The Type object associated with the audit rules of the current instance. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified handle. + The handle of the securable object with which this ObjectSecurity`1 object is associated. + + + Saves the security descriptor associated with this ObjectSecurity`1 object to permanent storage, using the specified name. + The name of the securable object with which this ObjectSecurity`1 object is associated. + + + Removes access rules that contain the same security identifier and access mask as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The rule to remove. + + if the access rule was successfully removed; otherwise, . + + + Removes all access rules that have the same security identifier as the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes all access rules that exactly match the specified access rule from the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object. + The access rule to remove. + + + Removes audit rules that contain the same security identifier and access mask as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove + + if the object was removed; otherwise, . + + + Removes all audit rules that have the same security identifier as the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all audit rules that exactly match the specified audit rule from the System Access Control List (SACL) associated with this ObjectSecurity`1 object. + The audit rule to remove. + + + Removes all access rules in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to reset. + + + Removes all access rules that contain the same security identifier and qualifier as the specified access rule in the Discretionary Access Control List (DACL) associated with this ObjectSecurity`1 object and then adds the specified access rule. + The access rule to set. + + + Removes all audit rules that contain the same security identifier and qualifier as the specified audit rule in the System Access Control List (SACL) associated with this ObjectSecurity`1 object and then adds the specified audit rule. + The audit rule to set. + + + The exception that is thrown when a method in the namespace attempts to enable a privilege that it does not have. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified privilege. + The privilege that is not enabled. + + + Initializes a new instance of the class by using the specified exception. + The privilege that is not enabled. + The exception that is the cause of the current exception. If the innerException parameter is not a null reference ( in Visual Basic), the current exception is raised in a block that handles the inner exception. + + + Sets the parameter with information about the exception. + The that holds the serialized object data about the exception being thrown. + The that contains contextual information about the source or destination. + + + Gets the name of the privilege that is not enabled. + The name of the privilege that the method failed to enable. + + + Specifies how Access Control Entries (ACEs) are propagated to child objects. These flags are significant only if inheritance flags are present. + + + Specifies that the ACE is propagated only to child objects. This includes both container and leaf child objects. + + + Specifies that no inheritance flags are set. + + + Specifies that the ACE is not propagated to child objects. + + + Represents an Access Control Entry (ACE) that contains a qualifier. The qualifier, represented by an object, specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. The class is the abstract base class for the and classes. + + + Gets a value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + A value that specifies whether the ACE allows access, denies access, causes system audits, or causes system alarms. + + + Returns the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data associated with this object. + + + Specifies whether this object contains callback data. + + if this object contains callback data; otherwise, false. + + + Gets the length of the opaque callback data associated with this object. This property is valid only for callback Access Control Entries (ACEs). + The length of the opaque callback data. + + + Sets the opaque callback data associated with this object. + An array of byte values that represents the opaque callback data for this object. + + + Represents an Access Control List (ACL). + + + Initializes a new instance of the class with the specified revision level. + The revision level of the new Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class from the specified binary form. + An array of byte values that represent an Access Control List (ACL). + The offset in the parameter at which to begin unmarshaling data. + + + Gets the length, in bytes, of the binary representation of the current object. This length should be used before marshaling the ACL into a binary array with the method. + The length, in bytes, of the binary representation of the current object. + + + Gets the number of access control entries (ACEs) in the current object. + The number of ACEs in the current object. + + + Marshals the contents of the object into the specified byte array beginning at the specified offset. + The byte array into which the contents of the is marshaled. + The offset at which to start marshaling. + + is negative or too high to allow the entire to be copied into . + + + Inserts the specified Access Control Entry (ACE) at the specified index. + The position at which to add the new ACE. Specify the value of the property to insert an ACE at the end of the object. + The ACE to insert. + + is negative or too high to allow the entire to be copied into . + + + Gets or sets the Access Control Entry (ACE) at the specified index. + The zero-based index of the ACE to get or set. + The ACE at the specified index. + + + Removes the Access Control Entry (ACE) at the specified location. + The zero-based index of the ACE to remove. + The value of the parameter is higher than the value of the property minus one or is negative. + + + Gets the revision level of the . + A byte value that specifies the revision level of the . + + + Represents a security descriptor. A security descriptor includes an owner, a primary group, a Discretionary Access Control List (DACL), and a System Access Control List (SACL). + + + Initializes a new instance of the class from the specified array of byte values. + The array of byte values from which to create the new object. + The offset in the array at which to begin copying. + + + Initializes a new instance of the class with the specified values. + Flags that specify behavior of the new object. + The owner for the new object. + The primary group for the new object. + The System Access Control List (SACL) for the new object. + The Discretionary Access Control List (DACL) for the new object. + + + Initializes a new instance of the class from the specified Security Descriptor Definition Language (SDDL) string. + The SDDL string from which to create the new object. + + + Gets values that specify behavior of the object. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the Discretionary Access Control List (DACL) for this object. The DACL contains access rules. + The DACL for this object. + + + Gets or sets the primary group for this object. + The primary group for this object. + + + Gets or sets the owner of the object associated with this object. + The owner of the object associated with this object. + + + Gets or sets a byte value that represents the resource manager control bits associated with this object. + A byte value that represents the resource manager control bits associated with this object. + + + Sets the property of this object to the specified value. + One or more values of the enumeration combined with a logical OR operation. + + + Gets or sets the System Access Control List (SACL) for this object. The SACL contains audit rules. + The SACL for this object. + + + Specifies the defined native object types. + + + A directory service (DS) object or a property set or property of a directory service object. + + + A directory service object and all of its property sets and properties. + + + A file or directory. + + + A local kernel object. + + + A network share. + + + A printer. + + + An object defined by a provider. + + + A registry key. + + + An object for a registry entry under WOW64. + + + A Windows service. + + + An unknown object type. + + + A window station or desktop object on the local computer. + + + A Windows Management Instrumentation (WMI) object. + + + Specifies the section of a security descriptor to be queried or set. + + + Specifies the discretionary access control list (DACL). + + + Specifies the primary group identifier. + + + Specifies the owner identifier. + + + Specifies the system access control list (SACL). + + + Represents a System Access Control List (SACL). + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The revision level of the new object. + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The number of Access Control Entries (ACEs) this object can contain. This number is to be used only as a hint. + + + Initializes a new instance of the class with the specified values from the specified object. + + if the new object is a container. + + if the new object is a directory object Access Control List (ACL). + The underlying object for the new object. Specify to create an empty ACL. + + + Adds an audit rule to the current object. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Adds an audit rule with the specified settings to the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type for the new audit rule. + The type of audit rule to add. + The for which to add an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Adds an audit rule to the current object. + The for which to add an audit rule. + The for the new audit rule. + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for which to remove an audit rule. + + if this method successfully removes the specified audit rule; otherwise, . + + + Removes the specified audit rule from the current object. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + + + Removes the specified audit rule from the current object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The type of audit rule to remove. + The for which to remove an audit rule. + The access mask for the rule to be removed. + Flags that specify the inheritance properties of the rule to be removed. + Flags that specify the inheritance propagation properties for the rule to be removed. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the removed audit control rule applies. + The identity of the class of child objects which can inherit the removed audit rule. + + + Removes the specified audit rule from the current object. + The for which to remove an audit rule. + The for the rule to be removed. + + + Sets the specified audit rule for the specified object. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + + + Sets the specified audit rule for the specified object. Use this method for directory object Access Control Lists (ACLs) when specifying the object type or the inherited object type. + The audit condition to set. + The for which to set an audit rule. + The access mask for the new audit rule. + Flags that specify the inheritance properties of the new audit rule. + Flags that specify the inheritance propagation properties for the new audit rule. + Flags that specify if the and parameters contain non- values. + The identity of the class of objects to which the new audit rule applies. + The identity of the class of child objects which can inherit the new audit rule. + + + Sets the specified audit rule for the specified object. + The for which to set an audit rule. + The for which to set an audit rule. + + + \ No newline at end of file diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.AccessControl.dll b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.AccessControl.dll new file mode 100644 index 0000000..a367246 Binary files /dev/null and b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.AccessControl.dll differ diff --git a/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/uap10.0.16299/_._ b/packages/System.Security.AccessControl.4.7.0/runtimes/win/lib/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.AccessControl.4.7.0/useSharedDesignerContext.txt b/packages/System.Security.AccessControl.4.7.0/useSharedDesignerContext.txt new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.AccessControl.4.7.0/version.txt b/packages/System.Security.AccessControl.4.7.0/version.txt new file mode 100644 index 0000000..f5d54e7 --- /dev/null +++ b/packages/System.Security.AccessControl.4.7.0/version.txt @@ -0,0 +1 @@ +0f7f38c4fd323b26da10cce95f857f77f0f09b48 diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/.signature.p7s b/packages/System.Security.Cryptography.Xml.4.7.1/.signature.p7s new file mode 100644 index 0000000..302cd9a Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/.signature.p7s differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/Icon.png b/packages/System.Security.Cryptography.Xml.4.7.1/Icon.png new file mode 100644 index 0000000..ba1c7e0 Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/Icon.png differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/LICENSE.TXT b/packages/System.Security.Cryptography.Xml.4.7.1/LICENSE.TXT new file mode 100644 index 0000000..984713a --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/LICENSE.TXT @@ -0,0 +1,23 @@ +The MIT License (MIT) + +Copyright (c) .NET Foundation and Contributors + +All rights reserved. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/System.Security.Cryptography.Xml.4.7.1.nupkg b/packages/System.Security.Cryptography.Xml.4.7.1/System.Security.Cryptography.Xml.4.7.1.nupkg new file mode 100644 index 0000000..af2e905 Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/System.Security.Cryptography.Xml.4.7.1.nupkg differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/THIRD-PARTY-NOTICES.TXT b/packages/System.Security.Cryptography.Xml.4.7.1/THIRD-PARTY-NOTICES.TXT new file mode 100644 index 0000000..77a243e --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/THIRD-PARTY-NOTICES.TXT @@ -0,0 +1,375 @@ +.NET Core uses third-party libraries or other resources that may be +distributed under licenses different than the .NET Core software. + +In the event that we accidentally failed to list a required notice, please +bring it to our attention. Post an issue or email us: + + dotnet@microsoft.com + +The attached notices are provided for information only. + +License notice for ASP.NET +------------------------------- + +Copyright (c) .NET Foundation. All rights reserved. +Licensed under the Apache License, Version 2.0. + +Available at +https://github.com/aspnet/AspNetCore/blob/master/LICENSE.txt + +License notice for Slicing-by-8 +------------------------------- + +http://sourceforge.net/projects/slicing-by-8/ + +Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + + +This software program is licensed subject to the BSD License, available at +http://www.opensource.org/licenses/bsd-license.html. + + +License notice for Unicode data +------------------------------- + +http://www.unicode.org/copyright.html#License + +Copyright © 1991-2017 Unicode, Inc. All rights reserved. +Distributed under the Terms of Use in http://www.unicode.org/copyright.html. + +Permission is hereby granted, free of charge, to any person obtaining +a copy of the Unicode data files and any associated documentation +(the "Data Files") or Unicode software and any associated documentation +(the "Software") to deal in the Data Files or Software +without restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, and/or sell copies of +the Data Files or Software, and to permit persons to whom the Data Files +or Software are furnished to do so, provided that either +(a) this copyright and permission notice appear with all copies +of the Data Files or Software, or +(b) this copyright and permission notice appear in associated +Documentation. + +THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF +ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT OF THIRD PARTY RIGHTS. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS +NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL +DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, +DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER +TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THE DATA FILES OR SOFTWARE. + +Except as contained in this notice, the name of a copyright holder +shall not be used in advertising or otherwise to promote the sale, +use or other dealings in these Data Files or Software without prior +written authorization of the copyright holder. + +License notice for Zlib +----------------------- + +https://github.com/madler/zlib +http://zlib.net/zlib_license.html + +/* zlib.h -- interface of the 'zlib' general purpose compression library + version 1.2.11, January 15th, 2017 + + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler + + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + +*/ + +License notice for Mono +------------------------------- + +http://www.mono-project.com/docs/about-mono/ + +Copyright (c) .NET Foundation Contributors + +MIT License + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the Software), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for International Organization for Standardization +----------------------------------------------------------------- + +Portions (C) International Organization for Standardization 1986: + Permission to copy in any form is granted for use with + conforming SGML systems and applications as defined in + ISO 8879, provided this notice is included in all copies. + +License notice for Intel +------------------------ + +"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this +list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, +this list of conditions and the following disclaimer in the documentation +and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License notice for Xamarin and Novell +------------------------------------- + +Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Copyright (c) 2011 Novell, Inc (http://www.novell.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Third party notice for W3C +-------------------------- + +"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE +Status: This license takes effect 13 May, 2015. +This work is being provided by the copyright holders under the following license. +License +By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. +Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: +The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. +Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. +Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." +Disclaimers +THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. +COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. +The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." + +License notice for Bit Twiddling Hacks +-------------------------------------- + +Bit Twiddling Hacks + +By Sean Eron Anderson +seander@cs.stanford.edu + +Individually, the code snippets here are in the public domain (unless otherwise +noted) — feel free to use them however you please. The aggregate collection and +descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are +distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and +without even the implied warranty of merchantability or fitness for a particular +purpose. + +License notice for Brotli +-------------------------------------- + +Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +compress_fragment.c: +Copyright (c) 2011, Google Inc. +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +decode_fuzzer.c: +Copyright (c) 2015 The Chromium Authors. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." + +License notice for Json.NET +------------------------------- + +https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md + +The MIT License (MIT) + +Copyright (c) 2007 James Newton-King + +Permission is hereby granted, free of charge, to any person obtaining a copy of +this software and associated documentation files (the "Software"), to deal in +the Software without restriction, including without limitation the rights to +use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of +the Software, and to permit persons to whom the Software is furnished to do so, +subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS +FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR +COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for vectorized base64 encoding / decoding +-------------------------------------------------------- + +Copyright (c) 2005-2007, Nick Galbreath +Copyright (c) 2013-2017, Alfred Klomp +Copyright (c) 2015-2017, Wojciech Mula +Copyright (c) 2016-2017, Matthieu Darbois +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + +- Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + +- Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED +TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.dll b/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.dll new file mode 100644 index 0000000..efa6a1d Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.dll differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.xml b/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.xml new file mode 100644 index 0000000..68b67a4 --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/lib/net461/System.Security.Cryptography.Xml.xml @@ -0,0 +1,2060 @@ + + + + System.Security.Cryptography.Xml + + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using a byte array as the value. + The encrypted data to use for the element. + The parameter is . + The property has already been set. + + + Initializes a new instance of the class using a object. + The object to use. + The parameter is . + The property has already been set. + + + Gets or sets the element. + A object. + The property was set to . + The property was set more than once. + + + Gets or sets the element. + A byte array that represents the element. + The property was set to . + The property was set more than once. + + + Gets the XML values for the object. + A object that represents the XML information for the object. + The property and the property are . + + + Loads XML data from an into a object. + An that represents the XML data to load. + The parameter is . + The property and the property are . + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) pointing to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain information. + A Uniform Resource Identifier (URI) pointing to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Returns the XML representation of a object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object that represents an XML element to use as the reference. + The provided is . + + + Represents the object element of an XML signature that holds data to be signed. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified identification, MIME type, encoding, and data. + The identification to initialize the new instance of with. + The MIME type of the data used to initialize the new instance of . + The encoding of the data used to initialize the new instance of . + The data to initialize the new instance of with. + The parameter is . + + + Gets or sets the data value of the current object. + The data of the current . + The value used to set the property is . + + + Gets or sets the encoding of the current object. + The type of encoding of the current object. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the identification of the current object. + The name of the element that contains data to be used. + + + Loads a state from an XML element. + The XML element to load the state from. + The value from the XML element is . + + + Gets or sets the MIME type of the current object. + The MIME type of the current object. The default is . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Represents the private key of the element. + + + Initializes a new instance of the class with a new, randomly-generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of the class that holds the public key. + + + Returns the XML representation of a element. + The XML representation of the element. + + + Gets or sets the key value represented by a object. + The public key represented by a object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter is not a valid XML element. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use for the element. + The provided is . + The parameter does not contain a <> node. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a element to the element. + A object to add to the property. + + + Adds a element to the element. + A object to add to the property. + + + Gets or sets the optional element in XML encryption. + A string that represents a name for the key value. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads the specified XML information into the element in XML encryption. + An representing an XML element to use for the element. + The parameter is . + The parameter does not contain a element. + + + Gets or sets the optional attribute in XML encryption. + A string representing the value of the attribute. + + + Gets or sets the element in XML encryption. + A object. + + + Represents the abstract base class used in XML encryption from which the , , and classes derive. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that points to the data to encrypt. + The parameter is . + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain. + The Uniform Resource Identifier (URI) that points to the data to encrypt. + A object that describes transforms to be done on the data to encrypt. + The parameter is . + + + Adds a object to the current transform chain of an object. + A object to add to the transform chain. + + + Gets a value that indicates whether the cache is valid. + + if the cache is valid; otherwise, . + + + Returns the XML representation of an object. + An object that represents the values of the element in XML encryption. + The property is . + + + Loads an XML element into an object. + An object that represents an XML element. + The parameter is . + + + Gets or sets a reference type. + The reference type of the encrypted data. + + + Gets or sets the transform chain of an object. + A object that describes transforms used on the encrypted data. + + + Gets or sets the Uniform Resource Identifier (URI) of an object. + The Uniform Resource Identifier (URI) of the object. + The property was set to . + + + Represents the abstract base class from which the classes and derive. + + + Initializes a new instance of the class. + + + Adds an child element to the element in the current object in XML encryption. + An object. + + + Gets or sets the value for an instance of an class. + A object. + The property was set to . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the encoding of the encrypted data. + + + Gets or sets the element for XML encryption. + An object that represents the element. + + + Gets or sets the element in XML encryption. + An object. + + + Returns the XML representation of the object. + An object that represents the element in XML encryption. + + + Gets or sets the attribute of an instance in XML encryption. + A string of the attribute of the element. + + + Gets of sets the element in XML encryption. + A object. + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use in the element. + The provided is . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the media type of the encrypted data. + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the text form of the encrypted data. + + + Represents the process model for implementing XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified XML document. + An object used to initialize the object. + + + Initializes a new instance of the class using the specified XML document and evidence. + An object used to initialize the object. + An object associated with the object. + + + Defines a mapping between a key name and a symmetric key or an asymmetric key. + The name to map to . + The symmetric key to map to . + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not an RSA algorithm or a symmetric key. + + + Resets all key name mapping. + + + Decrypts an element using the specified symmetric algorithm. + The data to decrypt. + The symmetric key used to decrypt . + A byte array that contains the raw decrypted plain text. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts all elements of the XML document that were specified during initialization of the class. + The cryptographic key used to decrypt the document was not found. + + + Determines the key represented by the element. + The object that contains the key to retrieve. + A byte array that contains the key. + The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Decrypts an element using an asymmetric algorithm. + An array of bytes that represents an encrypted element. + The asymmetric key used to decrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts an element using a symmetric algorithm. + An array of bytes that represents an encrypted element. + The symmetric key used to decrypt . + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the element is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Gets or sets the evidence of the object from which the object is constructed. + An object. + + + Gets or sets the encoding used for XML encryption. + An object. + + + Encrypts the outer XML of an element using the specified X.509 certificate. + The XML element to encrypt. + The X.509 certificate to use for encryption. + An element that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not represent an RSA key algorithm. + + + Encrypts the outer XML of an element using the specified key in the key mapping table. + The XML element to encrypt. + A key name that can be found in the key mapping table. + An object that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not match a registered key name pair. +-or- +The cryptographic key described by the parameter is not supported. + + + Encrypts data in the specified byte array using the specified symmetric algorithm. + The data to encrypt. + The symmetric algorithm to use for encryption. + A byte array of encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + The data could not be encrypted using the specified parameters. + + + Encrypts the specified element or its contents using the specified symmetric algorithm. + The element or its contents to encrypt. + The symmetric algorithm to use for encryption. + + to encrypt only the contents of the element; to encrypt the entire element. + A byte array that contains the encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts the key that a recipient uses to decrypt an element. + The key to encrypt. + The asymmetric key used to encrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts a key using a symmetric algorithm that a recipient uses to decrypt an element. + The key to encrypt. + The symmetric key used to encrypt . + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Retrieves the decryption initialization vector (IV) from an object. + The object that contains the initialization vector (IV) to retrieve. + The Uniform Resource Identifier (URI) that describes the cryptographic algorithm associated with the value. + A byte array that contains the decryption initialization vector (IV). + The value of the parameter is . + The value of the parameter has an property that is null. +-or- +The value of the parameter is not a supported algorithm. + + + Retrieves the decryption key from the specified object. + The object that contains the decryption key to retrieve. + The size of the decryption key to retrieve. + A object associated with the decryption key. + The value of the parameter is . + The encryptedData parameter has an property that is null. +-or- +The encrypted key cannot be retrieved using the specified parameters. + + + Determines how to resolve internal Uniform Resource Identifier (URI) references. + An object that contains an element with an ID value. + A string that represents the ID value. + An object that contains an ID indicating how internal Uniform Resource Identifiers (URIs) are to be resolved. + + + Gets or sets the cipher mode used for XML encryption. + One of the values. + + + Gets or sets the padding mode used for XML encryption. + One of the values that specifies the type of padding used for encryption. + + + Gets or sets the recipient of the encrypted key information. + The recipient of the encrypted key information. + + + Replaces an element with a specified decrypted sequence of bytes. + The element to replace. + The decrypted data to replace with. + The value of the parameter is . +-or- +The value of the parameter is . + + + Replaces the specified element with the specified object. + The element to replace with an element. + The object to replace the parameter with. + + to replace only the contents of the element; to replace the entire element. + The value of the parameter is . +-or- +The value of the parameter is . + + + Gets or sets the object used by the Document Object Model (DOM) to resolve external XML references. + An object. + + + Gets or sets the XML digital signature recursion depth to prevent infinite recursion and stack overflow. This might happen if the digital signature XML contains the URI which then points back to the original XML. + Returns . + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Digital Encryption Standard (DES) algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption element content. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for an XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption syntax and processing. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Public Key Cryptography Standard (PKCS) Version 1.5 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Optimal Asymmetric Encryption Padding (OAEP) encryption algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-256 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-512 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the TRIPLEDES key wrap algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Triple DES algorithm. This field is constant. + + + Encapsulates the encryption algorithm used for XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying an algorithm Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that describes the algorithm represented by an instance of the class. + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets or sets a Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + A Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + + + Gets or sets the algorithm key size used for XML encryption. + The algorithm key size, in bits, used for XML encryption. + The property was set to a value that was less than 0. + + + Parses the specified object and configures the internal state of the object to match. + An object to parse. + The parameter is . + The key size expressed in the parameter was less than 0. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object to use for initialization. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets the ID of the current object. + The ID of the current object. + + + Parses the input and configures the internal state of the object to match. + An object to parse. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets or sets an object that represents an object. + An object that represents an object. + The property was set to . + The property of the value set to the property is not "EncryptionProperty". +-or- +The property of the value set to the property is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets the target of the object. + The target of the object. + + + Represents a collection of classes used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds an object to the object. + An object to add to the object. + The position at which the new element is inserted. + + + Removes all items from the object. + + + Determines whether the object contains a specific object. + The object to locate in the object. + + if the object is found in the object; otherwise, . + + + Copies the elements of the object to an array, starting at a particular array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Copies the elements of the object to an array of objects, starting at a particular array index. + The one-dimensional array of objects that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through an object. + An object that can be used to iterate through an object. + + + Determines the index of a specific item in the object. + The object to locate in the object. + The index of if found in the collection; otherwise, -1. + + + Inserts an object into the object at the specified position. + The zero-based index at which should be inserted. + An object to insert into the object. + + + Gets a value that indicates whether the object has a fixed size. + + if the object has a fixed size; otherwise, . + + + Gets a value that indicates whether the object is read-only. + + if the object is read-only; otherwise, . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Gets or sets the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Removes the first occurrence of a specific object from the object. + The object to remove from the object. + + + Removes the object at the specified index. + The zero-based index of the object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + Adds an item to the . + The to add to the . + The position into which the new element was inserted. + + uses an incorrect object type. + + + Determines whether the contains a specific value. + The to locate in the . + + if the is found in the ; otherwise, . + + uses an incorrect object type. + + + Determines the index of a specific item in the . + The to locate in the . + The index of if found in the list; otherwise, -1. + + uses an incorrect object type. + + + Inserts an item to the at the specified index. + The zero-based index at which should be inserted. + The to insert into the . + + uses an incorrect object type. + + + Gets the element at the specified index. + The to remove from the . + The element at the specified index. + + + Removes the first occurrence of a specific object from the . + The to remove from the . + + uses an incorrect object type. + + + Defines methods that decrypt an XrML element. + + + Decrypts an XrML element that is contained within a object. + An object that encapsulates the algorithm used for XML encryption. + A object that contains an asymmetric key to use for decryption. + A stream object that contains an element to decrypt. + A object that contains a decrypted element. + + + Represents an XML digital signature or XML encryption element. + + + Initializes a new instance of the class. + + + Adds a that represents a particular type of information to the object. + The to add to the object. + + + Gets the number of objects contained in the object. + The number of objects contained in the object. + + + Returns an enumerator of the objects in the object. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns an enumerator of the objects of the specified type in the object. + The type of object to enumerate. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the key information identity. + The key information identity. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + + + Represents the abstract base class from which all implementations of subelements inherit. + + + Initializes a new instance of . + + + When overridden in a derived class, returns an XML representation of the . + An XML representation of the . + + + When overridden in a derived class, parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Wraps the class, it to be placed as a subelement of the class. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object that encapsulates an encrypted key. + + + Gets or sets an object that encapsulates an encrypted key. + An object that encapsulates an encrypted key. + The property is . + + + Returns an XML representation of a object. + An XML representation of a object. + The encrypted key is . + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + + + Represents a subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the string identifier that is the value of the element. + The string identifier that is the value of the element. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + + + Gets or sets the string identifier contained within a element. + The string identifier that is the value of the element. + + + Handles subelements that do not have specific implementations or handlers registered on the machine. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with content taken from the specified . + An XML element from which to take the content used to create the new instance of . + + + Returns an XML representation of the . + An XML representation of the . + + + Parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Gets or sets the XML content of the current . + The XML content of the current . + + + References objects stored at a different location when using XMLDSIG or XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object and the URI that describes the type of data to retrieve. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + The URI that describes the type of data to retrieve. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The XML element that specifies the state of the object. + The parameter is . + + + Gets or sets a Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + A Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + + + Gets or sets the Uniform Resource Identifier (URI) of the object. + The Uniform Resource Identifier (URI) of the object. + + + Represents an subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified ASN.1 DER encoding of an X.509v3 certificate. + The ASN.1 DER encoding of an object to initialize the new instance of from. + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + The parameter is . + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + One of the values that specifies how much of the certificate chain to include. + The parameter is . + The certificate has only a partial certificate chain. + + + Adds the specified X.509v3 certificate to the . + The object to add to the object. + The parameter is . + + + Adds the specified issuer name and serial number pair to the object. + The issuer name portion of the pair to add to the object. + The serial number portion of the pair to add to the object. + + + Adds the specified subject key identifier (SKI) byte array to the object. + A byte array that represents the subject key identifier (SKI) to add to the object. + + + Adds the specified subject key identifier (SKI) string to the object. + A string that represents the subject key identifier (SKI) to add to the object. + + + Adds the subject name of the entity that was issued an X.509v3 certificate to the object. + The name of the entity that was issued an X.509 certificate to add to the object. + + + Gets a list of the X.509v3 certificates contained in the object. + A list of the X.509 certificates contained in the object. + + + Gets or sets the Certificate Revocation List (CRL) contained within the object. + The Certificate Revocation List (CRL) contained within the object. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Gets a list of structures that represent an issuer name and serial number pair. + A list of structures that represent an issuer name and serial number pair. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + The parameter does not contain an <> node. +-or- +The parameter does not contain an <> node. + + + Gets a list of the subject key identifiers (SKIs) contained in the object. + A list of the subject key identifiers (SKIs) contained in the object. + + + Gets a list of the subject names of the entities contained in the object. + A list of the subject names of the entities contained in the object. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class for XML encryption. + + + Initializes a new instance of the class for XML encryption using the supplied Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted key. + + + Initializes a new instance of the class for XML encryption using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted key. + A object that describes transforms to do on the encrypted key. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with a hash value of the specified . + The with which to initialize the new instance of . + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance of . + + + Adds a object to the list of transforms to be performed on the data before passing it to the digest algorithm. + The transform to be added to the list of transforms. + The parameter is . + + + Gets or sets the digest method Uniform Resource Identifier (URI) of the current . + The digest method URI of the current . The default value is http://www.w3.org/2000/09/xmldsig#sha1. + + + Gets or sets the digest value of the current . + The digest value of the current . + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain any transforms. +-or- +The parameter contains an unknown transform. + + + Gets the transform chain of the current . + The transform chain of the current . + + + Gets or sets the type of the object being signed. + The type of the object being signed. + + + Gets or sets the of the current . + The of the current . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a or object to the collection. + A or object to add to the collection. + The position at which the new element was inserted. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Removes all items from the collection. + + + Determines whether the collection contains a specific or object. + The or object to locate in the collection. + + if the or object is found in the collection; otherwise, . + + + Copies the elements of the object to an array, starting at a specified array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through a collection. + An object that can be used to iterate through a collection. + + + Determines the index of a specific item in the collection. + The or object to locate in the collection. + The index of if found in the collection; otherwise, -1. + + + Inserts a or object into the collection at the specified position. + The zero-based index at which should be inserted. + A or object to insert into the collection. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the or object at the specified index. + The index of the or object to return. + The or object at the specified index. + + + Gets or sets the or object at the specified index. + The index of the or object to return. + The object at the specified index. + + + Removes the first occurrence of a specific or object from the collection. + The or object to remove from the collection. + + + Removes the or object at the specified index. + The zero-based index of the or object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + For a description of this member, see . + + if the has a fixed size; otherwise, . + + + For a description of this member, see . + + if the is read-only; otherwise, . + + + For a description of this member, see . + The zero-based index of the element to get or set. + The element at the specified index. + + is not a valid index in the . + + + Represents the <> element of an XML signature. + + + Initializes a new instance of the class with a new randomly generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of that holds the public key. + + + Returns the XML representation of the key clause. + The XML representation of the key clause. + + + Gets or sets the instance of that holds the public key. + The instance of that holds the public key. + + + Loads an key clause from an XML element. + The XML element from which to load the key clause. + The parameter is . + The parameter is not a valid key clause XML element. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class. + + + Adds a to the list of objects to be signed. + The to be added to the list of objects to be signed. + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Gets or sets the of the current . + The of the current . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain a valid . +-or- +The parameter does not contain a valid . + + + Gets or sets a list of objects to be signed. + A list of objects to be signed. + + + Gets or sets the value of the digital signature. + A byte array that contains the value of the digital signature. + + + Gets or sets the of the current . + The of the current . + + + Contains information about the canonicalization algorithm and signature algorithm used for the XML signature. + + + Initializes a new instance of the class. + + + Adds a object to the list of references to digest and sign. + The reference to add to the list of references. + The reference parameter is . + + + Gets or sets the canonicalization algorithm that is used before signing for the current object. + The canonicalization algorithm used before signing for the current object. + + + Gets a object used for canonicalization. + A object used for canonicalization. + + is . + + + Copies the elements of this instance into an object, starting at a specified index in the array. + An object that holds the collection's elements. + The beginning index in the array where the elements are copied. + This method is not supported. + + + Gets the number of references in the current object. + The number of references in the current object. + This property is not supported. + + + Returns an enumerator that iterates through the collection of references. + An enumerator that iterates through the collection of references. + This method is not supported. + + + Returns the XML representation of the object. + The XML representation of the instance. + The property is . +-or- +The property is empty. + + + Gets or sets the ID of the current object. + The ID of the current object. + + + Gets a value that indicates whether the collection is read-only. + + if the collection is read-only; otherwise, . + This property is not supported. + + + Gets a value that indicates whether the collection is synchronized. + + if the collection is synchronized; otherwise, . + This property is not supported. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter is not a valid element. +-or- +The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Gets a list of the objects of the current object. + A list of the elements of the current object. + + + Gets or sets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets or sets the name of the algorithm used for signature generation and validation for the current object. + The name of the algorithm used for signature generation and validation for the current object. + + + Gets an object to use for synchronization. + An object to use for synchronization. + This property is not supported. + + + Provides a wrapper on a core XML signature object to facilitate creating XML signatures. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified XML document. + The object to use to initialize the new instance of . + The parameter is . +-or- +The parameter contains a null property. + + + Initializes a new instance of the class from the specified object. + The object to use to initialize the new instance of . + The parameter is . + + + Adds a object to the list of objects to be signed. + The object to add to the list of objects to be signed. + + + Adds a object to the object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + The object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + + + Determines whether the property verifies using the public key in the signature. + + if the property verifies; otherwise, . + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified key. + The implementation of the property that holds the key to be used to verify the property. + + if the property verifies for the specified key; otherwise, . + The parameter is . + The property of the parameter does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified message authentication code (MAC) algorithm. + The implementation of that holds the MAC to be used to verify the property. + + if the property verifies for the specified MAC; otherwise, . + The parameter is . + The property of the specified object is not valid. +-or- +The property is . +-or- +The cryptographic transform used to check the signature could not be created. + + + Determines whether the property verifies for the specified object and, optionally, whether the certificate is valid. + The object to use to verify the property. + + to verify the signature only; to verify both the signature and certificate. + + if the signature is valid; otherwise, . +-or- + if the signature and certificate are valid; otherwise, . + The parameter is . + A signature description could not be created for the parameter. + + + Determines whether the property verifies using the public key in the signature. + When this method returns, contains the implementation of that holds the public key in the signature. This parameter is passed uninitialized. + + if the property verifies using the public key in the signature; otherwise, . + The parameter is null. + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Computes an XML digital signature. + The property is . +-or- +The property is not a object or object. +-or- +The key could not be loaded. + + + Computes an XML digital signature using the specified message authentication code (MAC) algorithm. + A object that holds the MAC to be used to compute the value of the property. + The parameter is . + The object specified by the parameter is not an instance of . +-or- +The property of the specified object is not valid. +-or- +The cryptographic transform used to check the signature could not be created. + + + Gets or sets an object that defines the XML encryption processing rules. + An object that defines the XML encryption processing rules. + + + Returns the object with the specified ID from the specified object. + The object to retrieve the object from. + The ID of the object to retrieve from the object. + The object with the specified ID from the specified object, or if it could not be found. + + + Returns the public key of a signature. + An object that contains the public key of the signature, or if the key cannot be found. + The property is . + + + Returns the XML representation of a object. + The XML representation of the object. + The property is . +-or- +The property is . + + + Gets or sets the object of the current object. + The object of the current object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Represents the object of the current object. + + + Represents the name of the installed key to be used for signing the object. + + + Sets the current object. + The current object. The defaults is a object. + + + Gets the names of methods whose canonicalization algorithms are explicitly allowed. + A collection of the names of methods that safely produce canonical XML. + + + Gets the object of the current object. + The object of the current object. + + + Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature. + + if the format is acceptable; otherwise, . + + + Gets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets the signature method of the current object. + The signature method of the current object. + + + Gets the signature value of the current object. + A byte array that contains the signature value of the current object. + + + Gets the object of the current object. + The object of the current object. + + + Gets or sets the asymmetric algorithm key used for signing a object. + The asymmetric algorithm key used for signing the object. + + + Gets or sets the name of the installed key to be used for signing the object. + The name of the installed key to be used for signing the object. + + + Represents the Uniform Resource Identifier (URI) for the XML mode decryption transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the base 64 transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures and includes comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for enveloped signature transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard minimal canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard namespace for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard signature method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-256 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-384 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-512 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the XML Path Language (XPath). This field is constant. + + + Represents the Uniform Resource Identifier (URI) for XSLT transformations. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the license transform algorithm used to normalize XrML licenses for signatures. + + + Represents the abstract base class from which all elements that can be used in an XML digital signature derive. + + + Initializes a new instance of the class. + + + Gets or sets the Uniform Resource Identifier (URI) that identifies the algorithm performed by the current transform. + The URI that identifies the algorithm performed by the current object. + + + Gets or sets an object that represents the document context under which the current object is running. + An object that represents the document context under which the current object is running. + + + When overridden in a derived class, returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + When overridden in a derived class, returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + When overridden in a derived class, returns the output of the current object. + The output of the current object. + + + When overridden in a derived class, returns the output of the current object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + + + Returns the XML representation of the current object. + The XML representation of the current object. + + + When overridden in a derived class, gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + When overridden in a derived class, parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + + + When overridden in a derived class, gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Gets or sets a object that contains the namespaces that are propagated into the signature. + A object that contains the namespaces that are propagated into the signature. + The property was set to . + + + Sets the current object. + The current object. This property defaults to an object. + + + Defines an ordered list of objects that is applied to unsigned content prior to digest calculation. + + + Initializes a new instance of the class. + + + Adds a transform to the list of transforms to be applied to the unsigned content prior to digest calculation. + The transform to add to the list of transforms. + + + Gets the number of transforms in the object. + The number of transforms in the object. + + + Returns an enumerator of the transforms in the object. + An enumerator of the transforms in the object. + + + Gets the transform at the specified index in the object. + The index into the object that specifies which transform to return. + The transform at the specified index in the object. + The parameter is greater than the number of transforms. + + + Specifies the order of XML Digital Signature and XML Encryption operations when both are performed on the same document. + + + Initializes a new instance of the class. + + + Adds a Uniform Resource Identifier (URI) to exclude from processing. + A Uniform Resource Identifier (URI) to exclude from processing + The parameter is . + + + Gets or sets an object that contains information about the keys necessary to decrypt an XML document. + An object that contains information about the keys necessary to decrypt an XML document. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + A decryption key could not be found. + + + Returns the output of the current object. + The type of the output to return. is the only valid type for this parameter. + The output of the current object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Determines whether the ID attribute of an object matches a specified value. + An object with an ID attribute to compare with . + The value to compare with the ID attribute of . + + if the ID attribute of the parameter matches the parameter; otherwise, . + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + The parameter is . +-or- +The Uniform Resource Identifier (URI) value of an object in was not found. +-or- +The length of the URI value of an object in is 0. +-or- +The first character of the URI value of an object in is not '#'. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the decoding transform as defined in Section 6.6.2 of the XMLDSIG specification. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns the digest associated with an object. + The object used to create a digest. + The digest associated with an object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because this element has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a object and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Represents the enveloped signature transform for an XML digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + The containing XML document is . + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified as transform-specific content of a element and configures the internal state of the current object to match the element. + An to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is . + The containing XML document is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a value that determines whether to include comments. + + to include comments; otherwise, . + + + Initializes a new instance of the class specifying whether to include comments, and specifying a list of namespace prefixes. + + to include comments; otherwise, . + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object as an object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + The parameter is not a object. +-or- +The parameter does not derive from a object. + + + Gets or sets a string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + A string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is not a object. +-or- +The parameter is not an object. +-or- +The parameter is not an object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Represents the XPath transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object to load into the current object. + The parameter is . +-or- +The parameter does not contain an element. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the XSLT transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that encapsulates an XSLT style sheet to load into the current object. This style sheet is applied to the document loaded by the method. + The parameter is . +-or- +The parameter does not contain an object. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the license transform algorithm used to normalize XrML licenses for signatures. + + + Initializes a new instance of the class. + + + Gets or sets the decryptor of the current object. + The decryptor of the current object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of an object. + The output of the object. + + + Returns the output of an object. + The type of the output to return. is the only valid type for this parameter. + The output of the object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of types that are valid inputs to the method of the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object that encapsulates the transform to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. The type of the input object must be . + The context was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The property was not set before this transform was invoked. + + + Gets an array of types that are valid outputs from the method of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + \ No newline at end of file diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.dll b/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.dll new file mode 100644 index 0000000..e9596ab Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.dll differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.xml b/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.xml new file mode 100644 index 0000000..68b67a4 --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/lib/netstandard2.0/System.Security.Cryptography.Xml.xml @@ -0,0 +1,2060 @@ + + + + System.Security.Cryptography.Xml + + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using a byte array as the value. + The encrypted data to use for the element. + The parameter is . + The property has already been set. + + + Initializes a new instance of the class using a object. + The object to use. + The parameter is . + The property has already been set. + + + Gets or sets the element. + A object. + The property was set to . + The property was set more than once. + + + Gets or sets the element. + A byte array that represents the element. + The property was set to . + The property was set more than once. + + + Gets the XML values for the object. + A object that represents the XML information for the object. + The property and the property are . + + + Loads XML data from an into a object. + An that represents the XML data to load. + The parameter is . + The property and the property are . + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) pointing to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain information. + A Uniform Resource Identifier (URI) pointing to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Returns the XML representation of a object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object that represents an XML element to use as the reference. + The provided is . + + + Represents the object element of an XML signature that holds data to be signed. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified identification, MIME type, encoding, and data. + The identification to initialize the new instance of with. + The MIME type of the data used to initialize the new instance of . + The encoding of the data used to initialize the new instance of . + The data to initialize the new instance of with. + The parameter is . + + + Gets or sets the data value of the current object. + The data of the current . + The value used to set the property is . + + + Gets or sets the encoding of the current object. + The type of encoding of the current object. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the identification of the current object. + The name of the element that contains data to be used. + + + Loads a state from an XML element. + The XML element to load the state from. + The value from the XML element is . + + + Gets or sets the MIME type of the current object. + The MIME type of the current object. The default is . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Represents the private key of the element. + + + Initializes a new instance of the class with a new, randomly-generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of the class that holds the public key. + + + Returns the XML representation of a element. + The XML representation of the element. + + + Gets or sets the key value represented by a object. + The public key represented by a object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter is not a valid XML element. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use for the element. + The provided is . + The parameter does not contain a <> node. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a element to the element. + A object to add to the property. + + + Adds a element to the element. + A object to add to the property. + + + Gets or sets the optional element in XML encryption. + A string that represents a name for the key value. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads the specified XML information into the element in XML encryption. + An representing an XML element to use for the element. + The parameter is . + The parameter does not contain a element. + + + Gets or sets the optional attribute in XML encryption. + A string representing the value of the attribute. + + + Gets or sets the element in XML encryption. + A object. + + + Represents the abstract base class used in XML encryption from which the , , and classes derive. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that points to the data to encrypt. + The parameter is . + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain. + The Uniform Resource Identifier (URI) that points to the data to encrypt. + A object that describes transforms to be done on the data to encrypt. + The parameter is . + + + Adds a object to the current transform chain of an object. + A object to add to the transform chain. + + + Gets a value that indicates whether the cache is valid. + + if the cache is valid; otherwise, . + + + Returns the XML representation of an object. + An object that represents the values of the element in XML encryption. + The property is . + + + Loads an XML element into an object. + An object that represents an XML element. + The parameter is . + + + Gets or sets a reference type. + The reference type of the encrypted data. + + + Gets or sets the transform chain of an object. + A object that describes transforms used on the encrypted data. + + + Gets or sets the Uniform Resource Identifier (URI) of an object. + The Uniform Resource Identifier (URI) of the object. + The property was set to . + + + Represents the abstract base class from which the classes and derive. + + + Initializes a new instance of the class. + + + Adds an child element to the element in the current object in XML encryption. + An object. + + + Gets or sets the value for an instance of an class. + A object. + The property was set to . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the encoding of the encrypted data. + + + Gets or sets the element for XML encryption. + An object that represents the element. + + + Gets or sets the element in XML encryption. + An object. + + + Returns the XML representation of the object. + An object that represents the element in XML encryption. + + + Gets or sets the attribute of an instance in XML encryption. + A string of the attribute of the element. + + + Gets of sets the element in XML encryption. + A object. + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use in the element. + The provided is . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the media type of the encrypted data. + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the text form of the encrypted data. + + + Represents the process model for implementing XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified XML document. + An object used to initialize the object. + + + Initializes a new instance of the class using the specified XML document and evidence. + An object used to initialize the object. + An object associated with the object. + + + Defines a mapping between a key name and a symmetric key or an asymmetric key. + The name to map to . + The symmetric key to map to . + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not an RSA algorithm or a symmetric key. + + + Resets all key name mapping. + + + Decrypts an element using the specified symmetric algorithm. + The data to decrypt. + The symmetric key used to decrypt . + A byte array that contains the raw decrypted plain text. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts all elements of the XML document that were specified during initialization of the class. + The cryptographic key used to decrypt the document was not found. + + + Determines the key represented by the element. + The object that contains the key to retrieve. + A byte array that contains the key. + The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Decrypts an element using an asymmetric algorithm. + An array of bytes that represents an encrypted element. + The asymmetric key used to decrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts an element using a symmetric algorithm. + An array of bytes that represents an encrypted element. + The symmetric key used to decrypt . + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the element is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Gets or sets the evidence of the object from which the object is constructed. + An object. + + + Gets or sets the encoding used for XML encryption. + An object. + + + Encrypts the outer XML of an element using the specified X.509 certificate. + The XML element to encrypt. + The X.509 certificate to use for encryption. + An element that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not represent an RSA key algorithm. + + + Encrypts the outer XML of an element using the specified key in the key mapping table. + The XML element to encrypt. + A key name that can be found in the key mapping table. + An object that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not match a registered key name pair. +-or- +The cryptographic key described by the parameter is not supported. + + + Encrypts data in the specified byte array using the specified symmetric algorithm. + The data to encrypt. + The symmetric algorithm to use for encryption. + A byte array of encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + The data could not be encrypted using the specified parameters. + + + Encrypts the specified element or its contents using the specified symmetric algorithm. + The element or its contents to encrypt. + The symmetric algorithm to use for encryption. + + to encrypt only the contents of the element; to encrypt the entire element. + A byte array that contains the encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts the key that a recipient uses to decrypt an element. + The key to encrypt. + The asymmetric key used to encrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts a key using a symmetric algorithm that a recipient uses to decrypt an element. + The key to encrypt. + The symmetric key used to encrypt . + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Retrieves the decryption initialization vector (IV) from an object. + The object that contains the initialization vector (IV) to retrieve. + The Uniform Resource Identifier (URI) that describes the cryptographic algorithm associated with the value. + A byte array that contains the decryption initialization vector (IV). + The value of the parameter is . + The value of the parameter has an property that is null. +-or- +The value of the parameter is not a supported algorithm. + + + Retrieves the decryption key from the specified object. + The object that contains the decryption key to retrieve. + The size of the decryption key to retrieve. + A object associated with the decryption key. + The value of the parameter is . + The encryptedData parameter has an property that is null. +-or- +The encrypted key cannot be retrieved using the specified parameters. + + + Determines how to resolve internal Uniform Resource Identifier (URI) references. + An object that contains an element with an ID value. + A string that represents the ID value. + An object that contains an ID indicating how internal Uniform Resource Identifiers (URIs) are to be resolved. + + + Gets or sets the cipher mode used for XML encryption. + One of the values. + + + Gets or sets the padding mode used for XML encryption. + One of the values that specifies the type of padding used for encryption. + + + Gets or sets the recipient of the encrypted key information. + The recipient of the encrypted key information. + + + Replaces an element with a specified decrypted sequence of bytes. + The element to replace. + The decrypted data to replace with. + The value of the parameter is . +-or- +The value of the parameter is . + + + Replaces the specified element with the specified object. + The element to replace with an element. + The object to replace the parameter with. + + to replace only the contents of the element; to replace the entire element. + The value of the parameter is . +-or- +The value of the parameter is . + + + Gets or sets the object used by the Document Object Model (DOM) to resolve external XML references. + An object. + + + Gets or sets the XML digital signature recursion depth to prevent infinite recursion and stack overflow. This might happen if the digital signature XML contains the URI which then points back to the original XML. + Returns . + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Digital Encryption Standard (DES) algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption element content. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for an XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption syntax and processing. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Public Key Cryptography Standard (PKCS) Version 1.5 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Optimal Asymmetric Encryption Padding (OAEP) encryption algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-256 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-512 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the TRIPLEDES key wrap algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Triple DES algorithm. This field is constant. + + + Encapsulates the encryption algorithm used for XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying an algorithm Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that describes the algorithm represented by an instance of the class. + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets or sets a Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + A Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + + + Gets or sets the algorithm key size used for XML encryption. + The algorithm key size, in bits, used for XML encryption. + The property was set to a value that was less than 0. + + + Parses the specified object and configures the internal state of the object to match. + An object to parse. + The parameter is . + The key size expressed in the parameter was less than 0. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object to use for initialization. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets the ID of the current object. + The ID of the current object. + + + Parses the input and configures the internal state of the object to match. + An object to parse. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets or sets an object that represents an object. + An object that represents an object. + The property was set to . + The property of the value set to the property is not "EncryptionProperty". +-or- +The property of the value set to the property is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets the target of the object. + The target of the object. + + + Represents a collection of classes used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds an object to the object. + An object to add to the object. + The position at which the new element is inserted. + + + Removes all items from the object. + + + Determines whether the object contains a specific object. + The object to locate in the object. + + if the object is found in the object; otherwise, . + + + Copies the elements of the object to an array, starting at a particular array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Copies the elements of the object to an array of objects, starting at a particular array index. + The one-dimensional array of objects that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through an object. + An object that can be used to iterate through an object. + + + Determines the index of a specific item in the object. + The object to locate in the object. + The index of if found in the collection; otherwise, -1. + + + Inserts an object into the object at the specified position. + The zero-based index at which should be inserted. + An object to insert into the object. + + + Gets a value that indicates whether the object has a fixed size. + + if the object has a fixed size; otherwise, . + + + Gets a value that indicates whether the object is read-only. + + if the object is read-only; otherwise, . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Gets or sets the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Removes the first occurrence of a specific object from the object. + The object to remove from the object. + + + Removes the object at the specified index. + The zero-based index of the object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + Adds an item to the . + The to add to the . + The position into which the new element was inserted. + + uses an incorrect object type. + + + Determines whether the contains a specific value. + The to locate in the . + + if the is found in the ; otherwise, . + + uses an incorrect object type. + + + Determines the index of a specific item in the . + The to locate in the . + The index of if found in the list; otherwise, -1. + + uses an incorrect object type. + + + Inserts an item to the at the specified index. + The zero-based index at which should be inserted. + The to insert into the . + + uses an incorrect object type. + + + Gets the element at the specified index. + The to remove from the . + The element at the specified index. + + + Removes the first occurrence of a specific object from the . + The to remove from the . + + uses an incorrect object type. + + + Defines methods that decrypt an XrML element. + + + Decrypts an XrML element that is contained within a object. + An object that encapsulates the algorithm used for XML encryption. + A object that contains an asymmetric key to use for decryption. + A stream object that contains an element to decrypt. + A object that contains a decrypted element. + + + Represents an XML digital signature or XML encryption element. + + + Initializes a new instance of the class. + + + Adds a that represents a particular type of information to the object. + The to add to the object. + + + Gets the number of objects contained in the object. + The number of objects contained in the object. + + + Returns an enumerator of the objects in the object. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns an enumerator of the objects of the specified type in the object. + The type of object to enumerate. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the key information identity. + The key information identity. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + + + Represents the abstract base class from which all implementations of subelements inherit. + + + Initializes a new instance of . + + + When overridden in a derived class, returns an XML representation of the . + An XML representation of the . + + + When overridden in a derived class, parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Wraps the class, it to be placed as a subelement of the class. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object that encapsulates an encrypted key. + + + Gets or sets an object that encapsulates an encrypted key. + An object that encapsulates an encrypted key. + The property is . + + + Returns an XML representation of a object. + An XML representation of a object. + The encrypted key is . + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + + + Represents a subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the string identifier that is the value of the element. + The string identifier that is the value of the element. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + + + Gets or sets the string identifier contained within a element. + The string identifier that is the value of the element. + + + Handles subelements that do not have specific implementations or handlers registered on the machine. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with content taken from the specified . + An XML element from which to take the content used to create the new instance of . + + + Returns an XML representation of the . + An XML representation of the . + + + Parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Gets or sets the XML content of the current . + The XML content of the current . + + + References objects stored at a different location when using XMLDSIG or XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object and the URI that describes the type of data to retrieve. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + The URI that describes the type of data to retrieve. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The XML element that specifies the state of the object. + The parameter is . + + + Gets or sets a Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + A Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + + + Gets or sets the Uniform Resource Identifier (URI) of the object. + The Uniform Resource Identifier (URI) of the object. + + + Represents an subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified ASN.1 DER encoding of an X.509v3 certificate. + The ASN.1 DER encoding of an object to initialize the new instance of from. + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + The parameter is . + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + One of the values that specifies how much of the certificate chain to include. + The parameter is . + The certificate has only a partial certificate chain. + + + Adds the specified X.509v3 certificate to the . + The object to add to the object. + The parameter is . + + + Adds the specified issuer name and serial number pair to the object. + The issuer name portion of the pair to add to the object. + The serial number portion of the pair to add to the object. + + + Adds the specified subject key identifier (SKI) byte array to the object. + A byte array that represents the subject key identifier (SKI) to add to the object. + + + Adds the specified subject key identifier (SKI) string to the object. + A string that represents the subject key identifier (SKI) to add to the object. + + + Adds the subject name of the entity that was issued an X.509v3 certificate to the object. + The name of the entity that was issued an X.509 certificate to add to the object. + + + Gets a list of the X.509v3 certificates contained in the object. + A list of the X.509 certificates contained in the object. + + + Gets or sets the Certificate Revocation List (CRL) contained within the object. + The Certificate Revocation List (CRL) contained within the object. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Gets a list of structures that represent an issuer name and serial number pair. + A list of structures that represent an issuer name and serial number pair. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + The parameter does not contain an <> node. +-or- +The parameter does not contain an <> node. + + + Gets a list of the subject key identifiers (SKIs) contained in the object. + A list of the subject key identifiers (SKIs) contained in the object. + + + Gets a list of the subject names of the entities contained in the object. + A list of the subject names of the entities contained in the object. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class for XML encryption. + + + Initializes a new instance of the class for XML encryption using the supplied Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted key. + + + Initializes a new instance of the class for XML encryption using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted key. + A object that describes transforms to do on the encrypted key. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with a hash value of the specified . + The with which to initialize the new instance of . + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance of . + + + Adds a object to the list of transforms to be performed on the data before passing it to the digest algorithm. + The transform to be added to the list of transforms. + The parameter is . + + + Gets or sets the digest method Uniform Resource Identifier (URI) of the current . + The digest method URI of the current . The default value is http://www.w3.org/2000/09/xmldsig#sha1. + + + Gets or sets the digest value of the current . + The digest value of the current . + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain any transforms. +-or- +The parameter contains an unknown transform. + + + Gets the transform chain of the current . + The transform chain of the current . + + + Gets or sets the type of the object being signed. + The type of the object being signed. + + + Gets or sets the of the current . + The of the current . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a or object to the collection. + A or object to add to the collection. + The position at which the new element was inserted. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Removes all items from the collection. + + + Determines whether the collection contains a specific or object. + The or object to locate in the collection. + + if the or object is found in the collection; otherwise, . + + + Copies the elements of the object to an array, starting at a specified array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through a collection. + An object that can be used to iterate through a collection. + + + Determines the index of a specific item in the collection. + The or object to locate in the collection. + The index of if found in the collection; otherwise, -1. + + + Inserts a or object into the collection at the specified position. + The zero-based index at which should be inserted. + A or object to insert into the collection. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the or object at the specified index. + The index of the or object to return. + The or object at the specified index. + + + Gets or sets the or object at the specified index. + The index of the or object to return. + The object at the specified index. + + + Removes the first occurrence of a specific or object from the collection. + The or object to remove from the collection. + + + Removes the or object at the specified index. + The zero-based index of the or object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + For a description of this member, see . + + if the has a fixed size; otherwise, . + + + For a description of this member, see . + + if the is read-only; otherwise, . + + + For a description of this member, see . + The zero-based index of the element to get or set. + The element at the specified index. + + is not a valid index in the . + + + Represents the <> element of an XML signature. + + + Initializes a new instance of the class with a new randomly generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of that holds the public key. + + + Returns the XML representation of the key clause. + The XML representation of the key clause. + + + Gets or sets the instance of that holds the public key. + The instance of that holds the public key. + + + Loads an key clause from an XML element. + The XML element from which to load the key clause. + The parameter is . + The parameter is not a valid key clause XML element. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class. + + + Adds a to the list of objects to be signed. + The to be added to the list of objects to be signed. + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Gets or sets the of the current . + The of the current . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain a valid . +-or- +The parameter does not contain a valid . + + + Gets or sets a list of objects to be signed. + A list of objects to be signed. + + + Gets or sets the value of the digital signature. + A byte array that contains the value of the digital signature. + + + Gets or sets the of the current . + The of the current . + + + Contains information about the canonicalization algorithm and signature algorithm used for the XML signature. + + + Initializes a new instance of the class. + + + Adds a object to the list of references to digest and sign. + The reference to add to the list of references. + The reference parameter is . + + + Gets or sets the canonicalization algorithm that is used before signing for the current object. + The canonicalization algorithm used before signing for the current object. + + + Gets a object used for canonicalization. + A object used for canonicalization. + + is . + + + Copies the elements of this instance into an object, starting at a specified index in the array. + An object that holds the collection's elements. + The beginning index in the array where the elements are copied. + This method is not supported. + + + Gets the number of references in the current object. + The number of references in the current object. + This property is not supported. + + + Returns an enumerator that iterates through the collection of references. + An enumerator that iterates through the collection of references. + This method is not supported. + + + Returns the XML representation of the object. + The XML representation of the instance. + The property is . +-or- +The property is empty. + + + Gets or sets the ID of the current object. + The ID of the current object. + + + Gets a value that indicates whether the collection is read-only. + + if the collection is read-only; otherwise, . + This property is not supported. + + + Gets a value that indicates whether the collection is synchronized. + + if the collection is synchronized; otherwise, . + This property is not supported. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter is not a valid element. +-or- +The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Gets a list of the objects of the current object. + A list of the elements of the current object. + + + Gets or sets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets or sets the name of the algorithm used for signature generation and validation for the current object. + The name of the algorithm used for signature generation and validation for the current object. + + + Gets an object to use for synchronization. + An object to use for synchronization. + This property is not supported. + + + Provides a wrapper on a core XML signature object to facilitate creating XML signatures. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified XML document. + The object to use to initialize the new instance of . + The parameter is . +-or- +The parameter contains a null property. + + + Initializes a new instance of the class from the specified object. + The object to use to initialize the new instance of . + The parameter is . + + + Adds a object to the list of objects to be signed. + The object to add to the list of objects to be signed. + + + Adds a object to the object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + The object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + + + Determines whether the property verifies using the public key in the signature. + + if the property verifies; otherwise, . + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified key. + The implementation of the property that holds the key to be used to verify the property. + + if the property verifies for the specified key; otherwise, . + The parameter is . + The property of the parameter does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified message authentication code (MAC) algorithm. + The implementation of that holds the MAC to be used to verify the property. + + if the property verifies for the specified MAC; otherwise, . + The parameter is . + The property of the specified object is not valid. +-or- +The property is . +-or- +The cryptographic transform used to check the signature could not be created. + + + Determines whether the property verifies for the specified object and, optionally, whether the certificate is valid. + The object to use to verify the property. + + to verify the signature only; to verify both the signature and certificate. + + if the signature is valid; otherwise, . +-or- + if the signature and certificate are valid; otherwise, . + The parameter is . + A signature description could not be created for the parameter. + + + Determines whether the property verifies using the public key in the signature. + When this method returns, contains the implementation of that holds the public key in the signature. This parameter is passed uninitialized. + + if the property verifies using the public key in the signature; otherwise, . + The parameter is null. + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Computes an XML digital signature. + The property is . +-or- +The property is not a object or object. +-or- +The key could not be loaded. + + + Computes an XML digital signature using the specified message authentication code (MAC) algorithm. + A object that holds the MAC to be used to compute the value of the property. + The parameter is . + The object specified by the parameter is not an instance of . +-or- +The property of the specified object is not valid. +-or- +The cryptographic transform used to check the signature could not be created. + + + Gets or sets an object that defines the XML encryption processing rules. + An object that defines the XML encryption processing rules. + + + Returns the object with the specified ID from the specified object. + The object to retrieve the object from. + The ID of the object to retrieve from the object. + The object with the specified ID from the specified object, or if it could not be found. + + + Returns the public key of a signature. + An object that contains the public key of the signature, or if the key cannot be found. + The property is . + + + Returns the XML representation of a object. + The XML representation of the object. + The property is . +-or- +The property is . + + + Gets or sets the object of the current object. + The object of the current object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Represents the object of the current object. + + + Represents the name of the installed key to be used for signing the object. + + + Sets the current object. + The current object. The defaults is a object. + + + Gets the names of methods whose canonicalization algorithms are explicitly allowed. + A collection of the names of methods that safely produce canonical XML. + + + Gets the object of the current object. + The object of the current object. + + + Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature. + + if the format is acceptable; otherwise, . + + + Gets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets the signature method of the current object. + The signature method of the current object. + + + Gets the signature value of the current object. + A byte array that contains the signature value of the current object. + + + Gets the object of the current object. + The object of the current object. + + + Gets or sets the asymmetric algorithm key used for signing a object. + The asymmetric algorithm key used for signing the object. + + + Gets or sets the name of the installed key to be used for signing the object. + The name of the installed key to be used for signing the object. + + + Represents the Uniform Resource Identifier (URI) for the XML mode decryption transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the base 64 transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures and includes comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for enveloped signature transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard minimal canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard namespace for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard signature method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-256 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-384 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-512 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the XML Path Language (XPath). This field is constant. + + + Represents the Uniform Resource Identifier (URI) for XSLT transformations. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the license transform algorithm used to normalize XrML licenses for signatures. + + + Represents the abstract base class from which all elements that can be used in an XML digital signature derive. + + + Initializes a new instance of the class. + + + Gets or sets the Uniform Resource Identifier (URI) that identifies the algorithm performed by the current transform. + The URI that identifies the algorithm performed by the current object. + + + Gets or sets an object that represents the document context under which the current object is running. + An object that represents the document context under which the current object is running. + + + When overridden in a derived class, returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + When overridden in a derived class, returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + When overridden in a derived class, returns the output of the current object. + The output of the current object. + + + When overridden in a derived class, returns the output of the current object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + + + Returns the XML representation of the current object. + The XML representation of the current object. + + + When overridden in a derived class, gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + When overridden in a derived class, parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + + + When overridden in a derived class, gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Gets or sets a object that contains the namespaces that are propagated into the signature. + A object that contains the namespaces that are propagated into the signature. + The property was set to . + + + Sets the current object. + The current object. This property defaults to an object. + + + Defines an ordered list of objects that is applied to unsigned content prior to digest calculation. + + + Initializes a new instance of the class. + + + Adds a transform to the list of transforms to be applied to the unsigned content prior to digest calculation. + The transform to add to the list of transforms. + + + Gets the number of transforms in the object. + The number of transforms in the object. + + + Returns an enumerator of the transforms in the object. + An enumerator of the transforms in the object. + + + Gets the transform at the specified index in the object. + The index into the object that specifies which transform to return. + The transform at the specified index in the object. + The parameter is greater than the number of transforms. + + + Specifies the order of XML Digital Signature and XML Encryption operations when both are performed on the same document. + + + Initializes a new instance of the class. + + + Adds a Uniform Resource Identifier (URI) to exclude from processing. + A Uniform Resource Identifier (URI) to exclude from processing + The parameter is . + + + Gets or sets an object that contains information about the keys necessary to decrypt an XML document. + An object that contains information about the keys necessary to decrypt an XML document. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + A decryption key could not be found. + + + Returns the output of the current object. + The type of the output to return. is the only valid type for this parameter. + The output of the current object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Determines whether the ID attribute of an object matches a specified value. + An object with an ID attribute to compare with . + The value to compare with the ID attribute of . + + if the ID attribute of the parameter matches the parameter; otherwise, . + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + The parameter is . +-or- +The Uniform Resource Identifier (URI) value of an object in was not found. +-or- +The length of the URI value of an object in is 0. +-or- +The first character of the URI value of an object in is not '#'. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the decoding transform as defined in Section 6.6.2 of the XMLDSIG specification. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns the digest associated with an object. + The object used to create a digest. + The digest associated with an object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because this element has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a object and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Represents the enveloped signature transform for an XML digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + The containing XML document is . + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified as transform-specific content of a element and configures the internal state of the current object to match the element. + An to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is . + The containing XML document is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a value that determines whether to include comments. + + to include comments; otherwise, . + + + Initializes a new instance of the class specifying whether to include comments, and specifying a list of namespace prefixes. + + to include comments; otherwise, . + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object as an object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + The parameter is not a object. +-or- +The parameter does not derive from a object. + + + Gets or sets a string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + A string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is not a object. +-or- +The parameter is not an object. +-or- +The parameter is not an object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Represents the XPath transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object to load into the current object. + The parameter is . +-or- +The parameter does not contain an element. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the XSLT transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that encapsulates an XSLT style sheet to load into the current object. This style sheet is applied to the document loaded by the method. + The parameter is . +-or- +The parameter does not contain an object. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the license transform algorithm used to normalize XrML licenses for signatures. + + + Initializes a new instance of the class. + + + Gets or sets the decryptor of the current object. + The decryptor of the current object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of an object. + The output of the object. + + + Returns the output of an object. + The type of the output to return. is the only valid type for this parameter. + The output of the object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of types that are valid inputs to the method of the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object that encapsulates the transform to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. The type of the input object must be . + The context was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The property was not set before this transform was invoked. + + + Gets an array of types that are valid outputs from the method of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + \ No newline at end of file diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.dll b/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.dll new file mode 100644 index 0000000..31d9216 Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.dll differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.xml b/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.xml new file mode 100644 index 0000000..68b67a4 --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/ref/net461/System.Security.Cryptography.Xml.xml @@ -0,0 +1,2060 @@ + + + + System.Security.Cryptography.Xml + + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using a byte array as the value. + The encrypted data to use for the element. + The parameter is . + The property has already been set. + + + Initializes a new instance of the class using a object. + The object to use. + The parameter is . + The property has already been set. + + + Gets or sets the element. + A object. + The property was set to . + The property was set more than once. + + + Gets or sets the element. + A byte array that represents the element. + The property was set to . + The property was set more than once. + + + Gets the XML values for the object. + A object that represents the XML information for the object. + The property and the property are . + + + Loads XML data from an into a object. + An that represents the XML data to load. + The parameter is . + The property and the property are . + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) pointing to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain information. + A Uniform Resource Identifier (URI) pointing to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Returns the XML representation of a object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object that represents an XML element to use as the reference. + The provided is . + + + Represents the object element of an XML signature that holds data to be signed. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified identification, MIME type, encoding, and data. + The identification to initialize the new instance of with. + The MIME type of the data used to initialize the new instance of . + The encoding of the data used to initialize the new instance of . + The data to initialize the new instance of with. + The parameter is . + + + Gets or sets the data value of the current object. + The data of the current . + The value used to set the property is . + + + Gets or sets the encoding of the current object. + The type of encoding of the current object. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the identification of the current object. + The name of the element that contains data to be used. + + + Loads a state from an XML element. + The XML element to load the state from. + The value from the XML element is . + + + Gets or sets the MIME type of the current object. + The MIME type of the current object. The default is . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Represents the private key of the element. + + + Initializes a new instance of the class with a new, randomly-generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of the class that holds the public key. + + + Returns the XML representation of a element. + The XML representation of the element. + + + Gets or sets the key value represented by a object. + The public key represented by a object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter is not a valid XML element. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use for the element. + The provided is . + The parameter does not contain a <> node. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a element to the element. + A object to add to the property. + + + Adds a element to the element. + A object to add to the property. + + + Gets or sets the optional element in XML encryption. + A string that represents a name for the key value. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads the specified XML information into the element in XML encryption. + An representing an XML element to use for the element. + The parameter is . + The parameter does not contain a element. + + + Gets or sets the optional attribute in XML encryption. + A string representing the value of the attribute. + + + Gets or sets the element in XML encryption. + A object. + + + Represents the abstract base class used in XML encryption from which the , , and classes derive. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that points to the data to encrypt. + The parameter is . + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain. + The Uniform Resource Identifier (URI) that points to the data to encrypt. + A object that describes transforms to be done on the data to encrypt. + The parameter is . + + + Adds a object to the current transform chain of an object. + A object to add to the transform chain. + + + Gets a value that indicates whether the cache is valid. + + if the cache is valid; otherwise, . + + + Returns the XML representation of an object. + An object that represents the values of the element in XML encryption. + The property is . + + + Loads an XML element into an object. + An object that represents an XML element. + The parameter is . + + + Gets or sets a reference type. + The reference type of the encrypted data. + + + Gets or sets the transform chain of an object. + A object that describes transforms used on the encrypted data. + + + Gets or sets the Uniform Resource Identifier (URI) of an object. + The Uniform Resource Identifier (URI) of the object. + The property was set to . + + + Represents the abstract base class from which the classes and derive. + + + Initializes a new instance of the class. + + + Adds an child element to the element in the current object in XML encryption. + An object. + + + Gets or sets the value for an instance of an class. + A object. + The property was set to . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the encoding of the encrypted data. + + + Gets or sets the element for XML encryption. + An object that represents the element. + + + Gets or sets the element in XML encryption. + An object. + + + Returns the XML representation of the object. + An object that represents the element in XML encryption. + + + Gets or sets the attribute of an instance in XML encryption. + A string of the attribute of the element. + + + Gets of sets the element in XML encryption. + A object. + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use in the element. + The provided is . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the media type of the encrypted data. + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the text form of the encrypted data. + + + Represents the process model for implementing XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified XML document. + An object used to initialize the object. + + + Initializes a new instance of the class using the specified XML document and evidence. + An object used to initialize the object. + An object associated with the object. + + + Defines a mapping between a key name and a symmetric key or an asymmetric key. + The name to map to . + The symmetric key to map to . + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not an RSA algorithm or a symmetric key. + + + Resets all key name mapping. + + + Decrypts an element using the specified symmetric algorithm. + The data to decrypt. + The symmetric key used to decrypt . + A byte array that contains the raw decrypted plain text. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts all elements of the XML document that were specified during initialization of the class. + The cryptographic key used to decrypt the document was not found. + + + Determines the key represented by the element. + The object that contains the key to retrieve. + A byte array that contains the key. + The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Decrypts an element using an asymmetric algorithm. + An array of bytes that represents an encrypted element. + The asymmetric key used to decrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts an element using a symmetric algorithm. + An array of bytes that represents an encrypted element. + The symmetric key used to decrypt . + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the element is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Gets or sets the evidence of the object from which the object is constructed. + An object. + + + Gets or sets the encoding used for XML encryption. + An object. + + + Encrypts the outer XML of an element using the specified X.509 certificate. + The XML element to encrypt. + The X.509 certificate to use for encryption. + An element that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not represent an RSA key algorithm. + + + Encrypts the outer XML of an element using the specified key in the key mapping table. + The XML element to encrypt. + A key name that can be found in the key mapping table. + An object that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not match a registered key name pair. +-or- +The cryptographic key described by the parameter is not supported. + + + Encrypts data in the specified byte array using the specified symmetric algorithm. + The data to encrypt. + The symmetric algorithm to use for encryption. + A byte array of encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + The data could not be encrypted using the specified parameters. + + + Encrypts the specified element or its contents using the specified symmetric algorithm. + The element or its contents to encrypt. + The symmetric algorithm to use for encryption. + + to encrypt only the contents of the element; to encrypt the entire element. + A byte array that contains the encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts the key that a recipient uses to decrypt an element. + The key to encrypt. + The asymmetric key used to encrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts a key using a symmetric algorithm that a recipient uses to decrypt an element. + The key to encrypt. + The symmetric key used to encrypt . + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Retrieves the decryption initialization vector (IV) from an object. + The object that contains the initialization vector (IV) to retrieve. + The Uniform Resource Identifier (URI) that describes the cryptographic algorithm associated with the value. + A byte array that contains the decryption initialization vector (IV). + The value of the parameter is . + The value of the parameter has an property that is null. +-or- +The value of the parameter is not a supported algorithm. + + + Retrieves the decryption key from the specified object. + The object that contains the decryption key to retrieve. + The size of the decryption key to retrieve. + A object associated with the decryption key. + The value of the parameter is . + The encryptedData parameter has an property that is null. +-or- +The encrypted key cannot be retrieved using the specified parameters. + + + Determines how to resolve internal Uniform Resource Identifier (URI) references. + An object that contains an element with an ID value. + A string that represents the ID value. + An object that contains an ID indicating how internal Uniform Resource Identifiers (URIs) are to be resolved. + + + Gets or sets the cipher mode used for XML encryption. + One of the values. + + + Gets or sets the padding mode used for XML encryption. + One of the values that specifies the type of padding used for encryption. + + + Gets or sets the recipient of the encrypted key information. + The recipient of the encrypted key information. + + + Replaces an element with a specified decrypted sequence of bytes. + The element to replace. + The decrypted data to replace with. + The value of the parameter is . +-or- +The value of the parameter is . + + + Replaces the specified element with the specified object. + The element to replace with an element. + The object to replace the parameter with. + + to replace only the contents of the element; to replace the entire element. + The value of the parameter is . +-or- +The value of the parameter is . + + + Gets or sets the object used by the Document Object Model (DOM) to resolve external XML references. + An object. + + + Gets or sets the XML digital signature recursion depth to prevent infinite recursion and stack overflow. This might happen if the digital signature XML contains the URI which then points back to the original XML. + Returns . + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Digital Encryption Standard (DES) algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption element content. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for an XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption syntax and processing. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Public Key Cryptography Standard (PKCS) Version 1.5 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Optimal Asymmetric Encryption Padding (OAEP) encryption algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-256 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-512 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the TRIPLEDES key wrap algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Triple DES algorithm. This field is constant. + + + Encapsulates the encryption algorithm used for XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying an algorithm Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that describes the algorithm represented by an instance of the class. + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets or sets a Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + A Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + + + Gets or sets the algorithm key size used for XML encryption. + The algorithm key size, in bits, used for XML encryption. + The property was set to a value that was less than 0. + + + Parses the specified object and configures the internal state of the object to match. + An object to parse. + The parameter is . + The key size expressed in the parameter was less than 0. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object to use for initialization. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets the ID of the current object. + The ID of the current object. + + + Parses the input and configures the internal state of the object to match. + An object to parse. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets or sets an object that represents an object. + An object that represents an object. + The property was set to . + The property of the value set to the property is not "EncryptionProperty". +-or- +The property of the value set to the property is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets the target of the object. + The target of the object. + + + Represents a collection of classes used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds an object to the object. + An object to add to the object. + The position at which the new element is inserted. + + + Removes all items from the object. + + + Determines whether the object contains a specific object. + The object to locate in the object. + + if the object is found in the object; otherwise, . + + + Copies the elements of the object to an array, starting at a particular array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Copies the elements of the object to an array of objects, starting at a particular array index. + The one-dimensional array of objects that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through an object. + An object that can be used to iterate through an object. + + + Determines the index of a specific item in the object. + The object to locate in the object. + The index of if found in the collection; otherwise, -1. + + + Inserts an object into the object at the specified position. + The zero-based index at which should be inserted. + An object to insert into the object. + + + Gets a value that indicates whether the object has a fixed size. + + if the object has a fixed size; otherwise, . + + + Gets a value that indicates whether the object is read-only. + + if the object is read-only; otherwise, . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Gets or sets the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Removes the first occurrence of a specific object from the object. + The object to remove from the object. + + + Removes the object at the specified index. + The zero-based index of the object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + Adds an item to the . + The to add to the . + The position into which the new element was inserted. + + uses an incorrect object type. + + + Determines whether the contains a specific value. + The to locate in the . + + if the is found in the ; otherwise, . + + uses an incorrect object type. + + + Determines the index of a specific item in the . + The to locate in the . + The index of if found in the list; otherwise, -1. + + uses an incorrect object type. + + + Inserts an item to the at the specified index. + The zero-based index at which should be inserted. + The to insert into the . + + uses an incorrect object type. + + + Gets the element at the specified index. + The to remove from the . + The element at the specified index. + + + Removes the first occurrence of a specific object from the . + The to remove from the . + + uses an incorrect object type. + + + Defines methods that decrypt an XrML element. + + + Decrypts an XrML element that is contained within a object. + An object that encapsulates the algorithm used for XML encryption. + A object that contains an asymmetric key to use for decryption. + A stream object that contains an element to decrypt. + A object that contains a decrypted element. + + + Represents an XML digital signature or XML encryption element. + + + Initializes a new instance of the class. + + + Adds a that represents a particular type of information to the object. + The to add to the object. + + + Gets the number of objects contained in the object. + The number of objects contained in the object. + + + Returns an enumerator of the objects in the object. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns an enumerator of the objects of the specified type in the object. + The type of object to enumerate. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the key information identity. + The key information identity. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + + + Represents the abstract base class from which all implementations of subelements inherit. + + + Initializes a new instance of . + + + When overridden in a derived class, returns an XML representation of the . + An XML representation of the . + + + When overridden in a derived class, parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Wraps the class, it to be placed as a subelement of the class. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object that encapsulates an encrypted key. + + + Gets or sets an object that encapsulates an encrypted key. + An object that encapsulates an encrypted key. + The property is . + + + Returns an XML representation of a object. + An XML representation of a object. + The encrypted key is . + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + + + Represents a subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the string identifier that is the value of the element. + The string identifier that is the value of the element. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + + + Gets or sets the string identifier contained within a element. + The string identifier that is the value of the element. + + + Handles subelements that do not have specific implementations or handlers registered on the machine. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with content taken from the specified . + An XML element from which to take the content used to create the new instance of . + + + Returns an XML representation of the . + An XML representation of the . + + + Parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Gets or sets the XML content of the current . + The XML content of the current . + + + References objects stored at a different location when using XMLDSIG or XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object and the URI that describes the type of data to retrieve. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + The URI that describes the type of data to retrieve. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The XML element that specifies the state of the object. + The parameter is . + + + Gets or sets a Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + A Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + + + Gets or sets the Uniform Resource Identifier (URI) of the object. + The Uniform Resource Identifier (URI) of the object. + + + Represents an subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified ASN.1 DER encoding of an X.509v3 certificate. + The ASN.1 DER encoding of an object to initialize the new instance of from. + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + The parameter is . + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + One of the values that specifies how much of the certificate chain to include. + The parameter is . + The certificate has only a partial certificate chain. + + + Adds the specified X.509v3 certificate to the . + The object to add to the object. + The parameter is . + + + Adds the specified issuer name and serial number pair to the object. + The issuer name portion of the pair to add to the object. + The serial number portion of the pair to add to the object. + + + Adds the specified subject key identifier (SKI) byte array to the object. + A byte array that represents the subject key identifier (SKI) to add to the object. + + + Adds the specified subject key identifier (SKI) string to the object. + A string that represents the subject key identifier (SKI) to add to the object. + + + Adds the subject name of the entity that was issued an X.509v3 certificate to the object. + The name of the entity that was issued an X.509 certificate to add to the object. + + + Gets a list of the X.509v3 certificates contained in the object. + A list of the X.509 certificates contained in the object. + + + Gets or sets the Certificate Revocation List (CRL) contained within the object. + The Certificate Revocation List (CRL) contained within the object. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Gets a list of structures that represent an issuer name and serial number pair. + A list of structures that represent an issuer name and serial number pair. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + The parameter does not contain an <> node. +-or- +The parameter does not contain an <> node. + + + Gets a list of the subject key identifiers (SKIs) contained in the object. + A list of the subject key identifiers (SKIs) contained in the object. + + + Gets a list of the subject names of the entities contained in the object. + A list of the subject names of the entities contained in the object. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class for XML encryption. + + + Initializes a new instance of the class for XML encryption using the supplied Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted key. + + + Initializes a new instance of the class for XML encryption using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted key. + A object that describes transforms to do on the encrypted key. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with a hash value of the specified . + The with which to initialize the new instance of . + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance of . + + + Adds a object to the list of transforms to be performed on the data before passing it to the digest algorithm. + The transform to be added to the list of transforms. + The parameter is . + + + Gets or sets the digest method Uniform Resource Identifier (URI) of the current . + The digest method URI of the current . The default value is http://www.w3.org/2000/09/xmldsig#sha1. + + + Gets or sets the digest value of the current . + The digest value of the current . + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain any transforms. +-or- +The parameter contains an unknown transform. + + + Gets the transform chain of the current . + The transform chain of the current . + + + Gets or sets the type of the object being signed. + The type of the object being signed. + + + Gets or sets the of the current . + The of the current . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a or object to the collection. + A or object to add to the collection. + The position at which the new element was inserted. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Removes all items from the collection. + + + Determines whether the collection contains a specific or object. + The or object to locate in the collection. + + if the or object is found in the collection; otherwise, . + + + Copies the elements of the object to an array, starting at a specified array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through a collection. + An object that can be used to iterate through a collection. + + + Determines the index of a specific item in the collection. + The or object to locate in the collection. + The index of if found in the collection; otherwise, -1. + + + Inserts a or object into the collection at the specified position. + The zero-based index at which should be inserted. + A or object to insert into the collection. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the or object at the specified index. + The index of the or object to return. + The or object at the specified index. + + + Gets or sets the or object at the specified index. + The index of the or object to return. + The object at the specified index. + + + Removes the first occurrence of a specific or object from the collection. + The or object to remove from the collection. + + + Removes the or object at the specified index. + The zero-based index of the or object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + For a description of this member, see . + + if the has a fixed size; otherwise, . + + + For a description of this member, see . + + if the is read-only; otherwise, . + + + For a description of this member, see . + The zero-based index of the element to get or set. + The element at the specified index. + + is not a valid index in the . + + + Represents the <> element of an XML signature. + + + Initializes a new instance of the class with a new randomly generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of that holds the public key. + + + Returns the XML representation of the key clause. + The XML representation of the key clause. + + + Gets or sets the instance of that holds the public key. + The instance of that holds the public key. + + + Loads an key clause from an XML element. + The XML element from which to load the key clause. + The parameter is . + The parameter is not a valid key clause XML element. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class. + + + Adds a to the list of objects to be signed. + The to be added to the list of objects to be signed. + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Gets or sets the of the current . + The of the current . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain a valid . +-or- +The parameter does not contain a valid . + + + Gets or sets a list of objects to be signed. + A list of objects to be signed. + + + Gets or sets the value of the digital signature. + A byte array that contains the value of the digital signature. + + + Gets or sets the of the current . + The of the current . + + + Contains information about the canonicalization algorithm and signature algorithm used for the XML signature. + + + Initializes a new instance of the class. + + + Adds a object to the list of references to digest and sign. + The reference to add to the list of references. + The reference parameter is . + + + Gets or sets the canonicalization algorithm that is used before signing for the current object. + The canonicalization algorithm used before signing for the current object. + + + Gets a object used for canonicalization. + A object used for canonicalization. + + is . + + + Copies the elements of this instance into an object, starting at a specified index in the array. + An object that holds the collection's elements. + The beginning index in the array where the elements are copied. + This method is not supported. + + + Gets the number of references in the current object. + The number of references in the current object. + This property is not supported. + + + Returns an enumerator that iterates through the collection of references. + An enumerator that iterates through the collection of references. + This method is not supported. + + + Returns the XML representation of the object. + The XML representation of the instance. + The property is . +-or- +The property is empty. + + + Gets or sets the ID of the current object. + The ID of the current object. + + + Gets a value that indicates whether the collection is read-only. + + if the collection is read-only; otherwise, . + This property is not supported. + + + Gets a value that indicates whether the collection is synchronized. + + if the collection is synchronized; otherwise, . + This property is not supported. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter is not a valid element. +-or- +The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Gets a list of the objects of the current object. + A list of the elements of the current object. + + + Gets or sets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets or sets the name of the algorithm used for signature generation and validation for the current object. + The name of the algorithm used for signature generation and validation for the current object. + + + Gets an object to use for synchronization. + An object to use for synchronization. + This property is not supported. + + + Provides a wrapper on a core XML signature object to facilitate creating XML signatures. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified XML document. + The object to use to initialize the new instance of . + The parameter is . +-or- +The parameter contains a null property. + + + Initializes a new instance of the class from the specified object. + The object to use to initialize the new instance of . + The parameter is . + + + Adds a object to the list of objects to be signed. + The object to add to the list of objects to be signed. + + + Adds a object to the object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + The object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + + + Determines whether the property verifies using the public key in the signature. + + if the property verifies; otherwise, . + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified key. + The implementation of the property that holds the key to be used to verify the property. + + if the property verifies for the specified key; otherwise, . + The parameter is . + The property of the parameter does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified message authentication code (MAC) algorithm. + The implementation of that holds the MAC to be used to verify the property. + + if the property verifies for the specified MAC; otherwise, . + The parameter is . + The property of the specified object is not valid. +-or- +The property is . +-or- +The cryptographic transform used to check the signature could not be created. + + + Determines whether the property verifies for the specified object and, optionally, whether the certificate is valid. + The object to use to verify the property. + + to verify the signature only; to verify both the signature and certificate. + + if the signature is valid; otherwise, . +-or- + if the signature and certificate are valid; otherwise, . + The parameter is . + A signature description could not be created for the parameter. + + + Determines whether the property verifies using the public key in the signature. + When this method returns, contains the implementation of that holds the public key in the signature. This parameter is passed uninitialized. + + if the property verifies using the public key in the signature; otherwise, . + The parameter is null. + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Computes an XML digital signature. + The property is . +-or- +The property is not a object or object. +-or- +The key could not be loaded. + + + Computes an XML digital signature using the specified message authentication code (MAC) algorithm. + A object that holds the MAC to be used to compute the value of the property. + The parameter is . + The object specified by the parameter is not an instance of . +-or- +The property of the specified object is not valid. +-or- +The cryptographic transform used to check the signature could not be created. + + + Gets or sets an object that defines the XML encryption processing rules. + An object that defines the XML encryption processing rules. + + + Returns the object with the specified ID from the specified object. + The object to retrieve the object from. + The ID of the object to retrieve from the object. + The object with the specified ID from the specified object, or if it could not be found. + + + Returns the public key of a signature. + An object that contains the public key of the signature, or if the key cannot be found. + The property is . + + + Returns the XML representation of a object. + The XML representation of the object. + The property is . +-or- +The property is . + + + Gets or sets the object of the current object. + The object of the current object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Represents the object of the current object. + + + Represents the name of the installed key to be used for signing the object. + + + Sets the current object. + The current object. The defaults is a object. + + + Gets the names of methods whose canonicalization algorithms are explicitly allowed. + A collection of the names of methods that safely produce canonical XML. + + + Gets the object of the current object. + The object of the current object. + + + Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature. + + if the format is acceptable; otherwise, . + + + Gets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets the signature method of the current object. + The signature method of the current object. + + + Gets the signature value of the current object. + A byte array that contains the signature value of the current object. + + + Gets the object of the current object. + The object of the current object. + + + Gets or sets the asymmetric algorithm key used for signing a object. + The asymmetric algorithm key used for signing the object. + + + Gets or sets the name of the installed key to be used for signing the object. + The name of the installed key to be used for signing the object. + + + Represents the Uniform Resource Identifier (URI) for the XML mode decryption transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the base 64 transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures and includes comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for enveloped signature transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard minimal canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard namespace for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard signature method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-256 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-384 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-512 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the XML Path Language (XPath). This field is constant. + + + Represents the Uniform Resource Identifier (URI) for XSLT transformations. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the license transform algorithm used to normalize XrML licenses for signatures. + + + Represents the abstract base class from which all elements that can be used in an XML digital signature derive. + + + Initializes a new instance of the class. + + + Gets or sets the Uniform Resource Identifier (URI) that identifies the algorithm performed by the current transform. + The URI that identifies the algorithm performed by the current object. + + + Gets or sets an object that represents the document context under which the current object is running. + An object that represents the document context under which the current object is running. + + + When overridden in a derived class, returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + When overridden in a derived class, returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + When overridden in a derived class, returns the output of the current object. + The output of the current object. + + + When overridden in a derived class, returns the output of the current object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + + + Returns the XML representation of the current object. + The XML representation of the current object. + + + When overridden in a derived class, gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + When overridden in a derived class, parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + + + When overridden in a derived class, gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Gets or sets a object that contains the namespaces that are propagated into the signature. + A object that contains the namespaces that are propagated into the signature. + The property was set to . + + + Sets the current object. + The current object. This property defaults to an object. + + + Defines an ordered list of objects that is applied to unsigned content prior to digest calculation. + + + Initializes a new instance of the class. + + + Adds a transform to the list of transforms to be applied to the unsigned content prior to digest calculation. + The transform to add to the list of transforms. + + + Gets the number of transforms in the object. + The number of transforms in the object. + + + Returns an enumerator of the transforms in the object. + An enumerator of the transforms in the object. + + + Gets the transform at the specified index in the object. + The index into the object that specifies which transform to return. + The transform at the specified index in the object. + The parameter is greater than the number of transforms. + + + Specifies the order of XML Digital Signature and XML Encryption operations when both are performed on the same document. + + + Initializes a new instance of the class. + + + Adds a Uniform Resource Identifier (URI) to exclude from processing. + A Uniform Resource Identifier (URI) to exclude from processing + The parameter is . + + + Gets or sets an object that contains information about the keys necessary to decrypt an XML document. + An object that contains information about the keys necessary to decrypt an XML document. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + A decryption key could not be found. + + + Returns the output of the current object. + The type of the output to return. is the only valid type for this parameter. + The output of the current object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Determines whether the ID attribute of an object matches a specified value. + An object with an ID attribute to compare with . + The value to compare with the ID attribute of . + + if the ID attribute of the parameter matches the parameter; otherwise, . + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + The parameter is . +-or- +The Uniform Resource Identifier (URI) value of an object in was not found. +-or- +The length of the URI value of an object in is 0. +-or- +The first character of the URI value of an object in is not '#'. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the decoding transform as defined in Section 6.6.2 of the XMLDSIG specification. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns the digest associated with an object. + The object used to create a digest. + The digest associated with an object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because this element has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a object and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Represents the enveloped signature transform for an XML digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + The containing XML document is . + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified as transform-specific content of a element and configures the internal state of the current object to match the element. + An to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is . + The containing XML document is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a value that determines whether to include comments. + + to include comments; otherwise, . + + + Initializes a new instance of the class specifying whether to include comments, and specifying a list of namespace prefixes. + + to include comments; otherwise, . + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object as an object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + The parameter is not a object. +-or- +The parameter does not derive from a object. + + + Gets or sets a string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + A string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is not a object. +-or- +The parameter is not an object. +-or- +The parameter is not an object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Represents the XPath transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object to load into the current object. + The parameter is . +-or- +The parameter does not contain an element. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the XSLT transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that encapsulates an XSLT style sheet to load into the current object. This style sheet is applied to the document loaded by the method. + The parameter is . +-or- +The parameter does not contain an object. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the license transform algorithm used to normalize XrML licenses for signatures. + + + Initializes a new instance of the class. + + + Gets or sets the decryptor of the current object. + The decryptor of the current object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of an object. + The output of the object. + + + Returns the output of an object. + The type of the output to return. is the only valid type for this parameter. + The output of the object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of types that are valid inputs to the method of the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object that encapsulates the transform to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. The type of the input object must be . + The context was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The property was not set before this transform was invoked. + + + Gets an array of types that are valid outputs from the method of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + \ No newline at end of file diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.dll b/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.dll new file mode 100644 index 0000000..ccfe64f Binary files /dev/null and b/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.dll differ diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.xml b/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.xml new file mode 100644 index 0000000..68b67a4 --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/ref/netstandard2.0/System.Security.Cryptography.Xml.xml @@ -0,0 +1,2060 @@ + + + + System.Security.Cryptography.Xml + + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using a byte array as the value. + The encrypted data to use for the element. + The parameter is . + The property has already been set. + + + Initializes a new instance of the class using a object. + The object to use. + The parameter is . + The property has already been set. + + + Gets or sets the element. + A object. + The property was set to . + The property was set more than once. + + + Gets or sets the element. + A byte array that represents the element. + The property was set to . + The property was set more than once. + + + Gets the XML values for the object. + A object that represents the XML information for the object. + The property and the property are . + + + Loads XML data from an into a object. + An that represents the XML data to load. + The parameter is . + The property and the property are . + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) pointing to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain information. + A Uniform Resource Identifier (URI) pointing to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Returns the XML representation of a object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object that represents an XML element to use as the reference. + The provided is . + + + Represents the object element of an XML signature that holds data to be signed. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified identification, MIME type, encoding, and data. + The identification to initialize the new instance of with. + The MIME type of the data used to initialize the new instance of . + The encoding of the data used to initialize the new instance of . + The data to initialize the new instance of with. + The parameter is . + + + Gets or sets the data value of the current object. + The data of the current . + The value used to set the property is . + + + Gets or sets the encoding of the current object. + The type of encoding of the current object. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the identification of the current object. + The name of the element that contains data to be used. + + + Loads a state from an XML element. + The XML element to load the state from. + The value from the XML element is . + + + Gets or sets the MIME type of the current object. + The MIME type of the current object. The default is . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted data. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted data. + A object that describes transforms to do on the encrypted data. + + + Represents the private key of the element. + + + Initializes a new instance of the class with a new, randomly-generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of the class that holds the public key. + + + Returns the XML representation of a element. + The XML representation of the element. + + + Gets or sets the key value represented by a object. + The public key represented by a object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter is not a valid XML element. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use for the element. + The provided is . + The parameter does not contain a <> node. + + + Represents the element in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a element to the element. + A object to add to the property. + + + Adds a element to the element. + A object to add to the property. + + + Gets or sets the optional element in XML encryption. + A string that represents a name for the key value. + + + Returns the XML representation of the object. + An that represents the element in XML encryption. + The value is . + + + Loads the specified XML information into the element in XML encryption. + An representing an XML element to use for the element. + The parameter is . + The parameter does not contain a element. + + + Gets or sets the optional attribute in XML encryption. + A string representing the value of the attribute. + + + Gets or sets the element in XML encryption. + A object. + + + Represents the abstract base class used in XML encryption from which the , , and classes derive. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that points to the data to encrypt. + The parameter is . + + + Initializes a new instance of the class using the specified Uniform Resource Identifier (URI) and transform chain. + The Uniform Resource Identifier (URI) that points to the data to encrypt. + A object that describes transforms to be done on the data to encrypt. + The parameter is . + + + Adds a object to the current transform chain of an object. + A object to add to the transform chain. + + + Gets a value that indicates whether the cache is valid. + + if the cache is valid; otherwise, . + + + Returns the XML representation of an object. + An object that represents the values of the element in XML encryption. + The property is . + + + Loads an XML element into an object. + An object that represents an XML element. + The parameter is . + + + Gets or sets a reference type. + The reference type of the encrypted data. + + + Gets or sets the transform chain of an object. + A object that describes transforms used on the encrypted data. + + + Gets or sets the Uniform Resource Identifier (URI) of an object. + The Uniform Resource Identifier (URI) of the object. + The property was set to . + + + Represents the abstract base class from which the classes and derive. + + + Initializes a new instance of the class. + + + Adds an child element to the element in the current object in XML encryption. + An object. + + + Gets or sets the value for an instance of an class. + A object. + The property was set to . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the encoding of the encrypted data. + + + Gets or sets the element for XML encryption. + An object that represents the element. + + + Gets or sets the element in XML encryption. + An object. + + + Returns the XML representation of the object. + An object that represents the element in XML encryption. + + + Gets or sets the attribute of an instance in XML encryption. + A string of the attribute of the element. + + + Gets of sets the element in XML encryption. + A object. + + + Loads XML information into the element in XML encryption. + An object representing an XML element to use in the element. + The provided is . + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the media type of the encrypted data. + + + Gets or sets the attribute of an instance in XML encryption. + A string that describes the text form of the encrypted data. + + + Represents the process model for implementing XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified XML document. + An object used to initialize the object. + + + Initializes a new instance of the class using the specified XML document and evidence. + An object used to initialize the object. + An object associated with the object. + + + Defines a mapping between a key name and a symmetric key or an asymmetric key. + The name to map to . + The symmetric key to map to . + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not an RSA algorithm or a symmetric key. + + + Resets all key name mapping. + + + Decrypts an element using the specified symmetric algorithm. + The data to decrypt. + The symmetric key used to decrypt . + A byte array that contains the raw decrypted plain text. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts all elements of the XML document that were specified during initialization of the class. + The cryptographic key used to decrypt the document was not found. + + + Determines the key represented by the element. + The object that contains the key to retrieve. + A byte array that contains the key. + The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Decrypts an element using an asymmetric algorithm. + An array of bytes that represents an encrypted element. + The asymmetric key used to decrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + + + Decrypts an element using a symmetric algorithm. + An array of bytes that represents an encrypted element. + The symmetric key used to decrypt . + A byte array that contains the plain text key. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the element is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Gets or sets the evidence of the object from which the object is constructed. + An object. + + + Gets or sets the encoding used for XML encryption. + An object. + + + Encrypts the outer XML of an element using the specified X.509 certificate. + The XML element to encrypt. + The X.509 certificate to use for encryption. + An element that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not represent an RSA key algorithm. + + + Encrypts the outer XML of an element using the specified key in the key mapping table. + The XML element to encrypt. + A key name that can be found in the key mapping table. + An object that represents the encrypted XML data. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter does not match a registered key name pair. +-or- +The cryptographic key described by the parameter is not supported. + + + Encrypts data in the specified byte array using the specified symmetric algorithm. + The data to encrypt. + The symmetric algorithm to use for encryption. + A byte array of encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + The data could not be encrypted using the specified parameters. + + + Encrypts the specified element or its contents using the specified symmetric algorithm. + The element or its contents to encrypt. + The symmetric algorithm to use for encryption. + + to encrypt only the contents of the element; to encrypt the entire element. + A byte array that contains the encrypted data. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts the key that a recipient uses to decrypt an element. + The key to encrypt. + The asymmetric key used to encrypt . + A value that specifies whether to use Optimal Asymmetric Encryption Padding (OAEP). + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + + + Encrypts a key using a symmetric algorithm that a recipient uses to decrypt an element. + The key to encrypt. + The symmetric key used to encrypt . + A byte array that represents the encrypted value of the parameter. + The value of the parameter is . +-or- +The value of the parameter is . + The value of the parameter is not the Triple DES Key Wrap algorithm or the Advanced Encryption Standard (AES) Key Wrap algorithm (also called Rijndael). + + + Retrieves the decryption initialization vector (IV) from an object. + The object that contains the initialization vector (IV) to retrieve. + The Uniform Resource Identifier (URI) that describes the cryptographic algorithm associated with the value. + A byte array that contains the decryption initialization vector (IV). + The value of the parameter is . + The value of the parameter has an property that is null. +-or- +The value of the parameter is not a supported algorithm. + + + Retrieves the decryption key from the specified object. + The object that contains the decryption key to retrieve. + The size of the decryption key to retrieve. + A object associated with the decryption key. + The value of the parameter is . + The encryptedData parameter has an property that is null. +-or- +The encrypted key cannot be retrieved using the specified parameters. + + + Determines how to resolve internal Uniform Resource Identifier (URI) references. + An object that contains an element with an ID value. + A string that represents the ID value. + An object that contains an ID indicating how internal Uniform Resource Identifiers (URIs) are to be resolved. + + + Gets or sets the cipher mode used for XML encryption. + One of the values. + + + Gets or sets the padding mode used for XML encryption. + One of the values that specifies the type of padding used for encryption. + + + Gets or sets the recipient of the encrypted key information. + The recipient of the encrypted key information. + + + Replaces an element with a specified decrypted sequence of bytes. + The element to replace. + The decrypted data to replace with. + The value of the parameter is . +-or- +The value of the parameter is . + + + Replaces the specified element with the specified object. + The element to replace with an element. + The object to replace the parameter with. + + to replace only the contents of the element; to replace the entire element. + The value of the parameter is . +-or- +The value of the parameter is . + + + Gets or sets the object used by the Document Object Model (DOM) to resolve external XML references. + An object. + + + Gets or sets the XML digital signature recursion depth to prevent infinite recursion and stack overflow. This might happen if the digital signature XML contains the URI which then points back to the original XML. + Returns . + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 128-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 192-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) Key Wrap algorithm (also known as the Rijndael Key Wrap algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the 256-bit Advanced Encryption Standard (AES) algorithm (also known as the Rijndael algorithm). This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Digital Encryption Standard (DES) algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption element content. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for an XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the XML encryption element. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for XML encryption syntax and processing. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Public Key Cryptography Standard (PKCS) Version 1.5 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the RSA Optimal Asymmetric Encryption Padding (OAEP) encryption algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-256 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the SHA-512 algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the TRIPLEDES key wrap algorithm. This field is constant. + + + Represents the namespace Uniform Resource Identifier (URI) for the Triple DES algorithm. This field is constant. + + + Encapsulates the encryption algorithm used for XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying an algorithm Uniform Resource Identifier (URI). + The Uniform Resource Identifier (URI) that describes the algorithm represented by an instance of the class. + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets or sets a Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + A Uniform Resource Identifier (URI) that describes the algorithm to use for XML encryption. + + + Gets or sets the algorithm key size used for XML encryption. + The algorithm key size, in bits, used for XML encryption. + The property was set to a value that was less than 0. + + + Parses the specified object and configures the internal state of the object to match. + An object to parse. + The parameter is . + The key size expressed in the parameter was less than 0. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object to use for initialization. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Returns an object that encapsulates an instance of the class. + An object that encapsulates an instance of the class. + + + Gets the ID of the current object. + The ID of the current object. + + + Parses the input and configures the internal state of the object to match. + An object to parse. + The parameter is . + The property of the parameter is not "EncryptionProperty". +-or- +The property of the parameter is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets or sets an object that represents an object. + An object that represents an object. + The property was set to . + The property of the value set to the property is not "EncryptionProperty". +-or- +The property of the value set to the property is not "http://www.w3.org/2001/04/xmlenc#". + + + Gets the target of the object. + The target of the object. + + + Represents a collection of classes used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds an object to the object. + An object to add to the object. + The position at which the new element is inserted. + + + Removes all items from the object. + + + Determines whether the object contains a specific object. + The object to locate in the object. + + if the object is found in the object; otherwise, . + + + Copies the elements of the object to an array, starting at a particular array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Copies the elements of the object to an array of objects, starting at a particular array index. + The one-dimensional array of objects that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through an object. + An object that can be used to iterate through an object. + + + Determines the index of a specific item in the object. + The object to locate in the object. + The index of if found in the collection; otherwise, -1. + + + Inserts an object into the object at the specified position. + The zero-based index at which should be inserted. + An object to insert into the object. + + + Gets a value that indicates whether the object has a fixed size. + + if the object has a fixed size; otherwise, . + + + Gets a value that indicates whether the object is read-only. + + if the object is read-only; otherwise, . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Gets or sets the object at the specified index. + The index of the object to return. + The object at the specified index. + + + Removes the first occurrence of a specific object from the object. + The object to remove from the object. + + + Removes the object at the specified index. + The zero-based index of the object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + Adds an item to the . + The to add to the . + The position into which the new element was inserted. + + uses an incorrect object type. + + + Determines whether the contains a specific value. + The to locate in the . + + if the is found in the ; otherwise, . + + uses an incorrect object type. + + + Determines the index of a specific item in the . + The to locate in the . + The index of if found in the list; otherwise, -1. + + uses an incorrect object type. + + + Inserts an item to the at the specified index. + The zero-based index at which should be inserted. + The to insert into the . + + uses an incorrect object type. + + + Gets the element at the specified index. + The to remove from the . + The element at the specified index. + + + Removes the first occurrence of a specific object from the . + The to remove from the . + + uses an incorrect object type. + + + Defines methods that decrypt an XrML element. + + + Decrypts an XrML element that is contained within a object. + An object that encapsulates the algorithm used for XML encryption. + A object that contains an asymmetric key to use for decryption. + A stream object that contains an element to decrypt. + A object that contains a decrypted element. + + + Represents an XML digital signature or XML encryption element. + + + Initializes a new instance of the class. + + + Adds a that represents a particular type of information to the object. + The to add to the object. + + + Gets the number of objects contained in the object. + The number of objects contained in the object. + + + Returns an enumerator of the objects in the object. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns an enumerator of the objects of the specified type in the object. + The type of object to enumerate. + An enumerator of the subelements of that can be used to iterate through the collection. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Gets or sets the key information identity. + The key information identity. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + + + Represents the abstract base class from which all implementations of subelements inherit. + + + Initializes a new instance of . + + + When overridden in a derived class, returns an XML representation of the . + An XML representation of the . + + + When overridden in a derived class, parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Wraps the class, it to be placed as a subelement of the class. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using an object. + An object that encapsulates an encrypted key. + + + Gets or sets an object that encapsulates an encrypted key. + An object that encapsulates an encrypted key. + The property is . + + + Returns an XML representation of a object. + An XML representation of a object. + The encrypted key is . + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + + + Represents a subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the string identifier that is the value of the element. + The string identifier that is the value of the element. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + + + Gets or sets the string identifier contained within a element. + The string identifier that is the value of the element. + + + Handles subelements that do not have specific implementations or handlers registered on the machine. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with content taken from the specified . + An XML element from which to take the content used to create the new instance of . + + + Returns an XML representation of the . + An XML representation of the . + + + Parses the input and configures the internal state of the to match. + The that specifies the state of the . + + + Gets or sets the XML content of the current . + The XML content of the current . + + + References objects stored at a different location when using XMLDSIG or XML encryption. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + + + Initializes a new instance of the class with the specified Uniform Resource Identifier (URI) pointing to the referenced object and the URI that describes the type of data to retrieve. + The Uniform Resource Identifier (URI) of the information to be referenced by the new instance of . + The URI that describes the type of data to retrieve. + + + Returns the XML representation of the object. + The XML representation of the object. + + + Parses the input object and configures the internal state of the object to match. + The XML element that specifies the state of the object. + The parameter is . + + + Gets or sets a Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + A Uniform Resource Identifier (URI) that describes the type of data to be retrieved. + + + Gets or sets the Uniform Resource Identifier (URI) of the object. + The Uniform Resource Identifier (URI) of the object. + + + Represents an subelement of an XMLDSIG or XML Encryption element. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified ASN.1 DER encoding of an X.509v3 certificate. + The ASN.1 DER encoding of an object to initialize the new instance of from. + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + The parameter is . + + + Initializes a new instance of the class from the specified X.509v3 certificate. + The object to initialize the new instance of from. + One of the values that specifies how much of the certificate chain to include. + The parameter is . + The certificate has only a partial certificate chain. + + + Adds the specified X.509v3 certificate to the . + The object to add to the object. + The parameter is . + + + Adds the specified issuer name and serial number pair to the object. + The issuer name portion of the pair to add to the object. + The serial number portion of the pair to add to the object. + + + Adds the specified subject key identifier (SKI) byte array to the object. + A byte array that represents the subject key identifier (SKI) to add to the object. + + + Adds the specified subject key identifier (SKI) string to the object. + A string that represents the subject key identifier (SKI) to add to the object. + + + Adds the subject name of the entity that was issued an X.509v3 certificate to the object. + The name of the entity that was issued an X.509 certificate to add to the object. + + + Gets a list of the X.509v3 certificates contained in the object. + A list of the X.509 certificates contained in the object. + + + Gets or sets the Certificate Revocation List (CRL) contained within the object. + The Certificate Revocation List (CRL) contained within the object. + + + Returns an XML representation of the object. + An XML representation of the object. + + + Gets a list of structures that represent an issuer name and serial number pair. + A list of structures that represent an issuer name and serial number pair. + + + Parses the input object and configures the internal state of the object to match. + The object that specifies the state of the object. + The parameter is . + The parameter does not contain an <> node. +-or- +The parameter does not contain an <> node. + + + Gets a list of the subject key identifiers (SKIs) contained in the object. + A list of the subject key identifiers (SKIs) contained in the object. + + + Gets a list of the subject names of the entities contained in the object. + A list of the subject names of the entities contained in the object. + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class for XML encryption. + + + Initializes a new instance of the class for XML encryption using the supplied Uniform Resource Identifier (URI). + A Uniform Resource Identifier (URI) that points to the encrypted key. + + + Initializes a new instance of the class for XML encryption using the specified Uniform Resource Identifier (URI) and a object. + A Uniform Resource Identifier (URI) that points to the encrypted key. + A object that describes transforms to do on the encrypted key. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with a hash value of the specified . + The with which to initialize the new instance of . + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance of . + + + Adds a object to the list of transforms to be performed on the data before passing it to the digest algorithm. + The transform to be added to the list of transforms. + The parameter is . + + + Gets or sets the digest method Uniform Resource Identifier (URI) of the current . + The digest method URI of the current . The default value is http://www.w3.org/2000/09/xmldsig#sha1. + + + Gets or sets the digest value of the current . + The digest value of the current . + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain any transforms. +-or- +The parameter contains an unknown transform. + + + Gets the transform chain of the current . + The transform chain of the current . + + + Gets or sets the type of the object being signed. + The type of the object being signed. + + + Gets or sets the of the current . + The of the current . + + + Represents the element used in XML encryption. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Adds a or object to the collection. + A or object to add to the collection. + The position at which the new element was inserted. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Removes all items from the collection. + + + Determines whether the collection contains a specific or object. + The or object to locate in the collection. + + if the or object is found in the collection; otherwise, . + + + Copies the elements of the object to an array, starting at a specified array index. + The one-dimensional object that is the destination of the elements copied from the object. The array must have zero-based indexing. + The zero-based index in at which copying begins. + + + Gets the number of elements contained in the object. + The number of elements contained in the object. + + + Returns an enumerator that iterates through a collection. + An object that can be used to iterate through a collection. + + + Determines the index of a specific item in the collection. + The or object to locate in the collection. + The index of if found in the collection; otherwise, -1. + + + Inserts a or object into the collection at the specified position. + The zero-based index at which should be inserted. + A or object to insert into the collection. + The parameter is not a object. +-or- +The parameter is not a object. + The parameter is . + + + Gets a value that indicates whether access to the object is synchronized (thread safe). + + if access to the object is synchronized (thread safe); otherwise, . + + + Returns the or object at the specified index. + The index of the or object to return. + The or object at the specified index. + + + Gets or sets the or object at the specified index. + The index of the or object to return. + The object at the specified index. + + + Removes the first occurrence of a specific or object from the collection. + The or object to remove from the collection. + + + Removes the or object at the specified index. + The zero-based index of the or object to remove. + + + Gets an object that can be used to synchronize access to the object. + An object that can be used to synchronize access to the object. + + + For a description of this member, see . + + if the has a fixed size; otherwise, . + + + For a description of this member, see . + + if the is read-only; otherwise, . + + + For a description of this member, see . + The zero-based index of the element to get or set. + The element at the specified index. + + is not a valid index in the . + + + Represents the <> element of an XML signature. + + + Initializes a new instance of the class with a new randomly generated public key. + + + Initializes a new instance of the class with the specified public key. + The instance of an implementation of that holds the public key. + + + Returns the XML representation of the key clause. + The XML representation of the key clause. + + + Gets or sets the instance of that holds the public key. + The instance of that holds the public key. + + + Loads an key clause from an XML element. + The XML element from which to load the key clause. + The parameter is . + The parameter is not a valid key clause XML element. + + + Represents the element of an XML signature. + + + Initializes a new instance of the class. + + + Adds a to the list of objects to be signed. + The to be added to the list of objects to be signed. + + + Returns the XML representation of the . + The XML representation of the . + The property is . +-or- +The property is . + + + Gets or sets the ID of the current . + The ID of the current . The default is . + + + Gets or sets the of the current . + The of the current . + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter does not contain a valid . +-or- +The parameter does not contain a valid . + + + Gets or sets a list of objects to be signed. + A list of objects to be signed. + + + Gets or sets the value of the digital signature. + A byte array that contains the value of the digital signature. + + + Gets or sets the of the current . + The of the current . + + + Contains information about the canonicalization algorithm and signature algorithm used for the XML signature. + + + Initializes a new instance of the class. + + + Adds a object to the list of references to digest and sign. + The reference to add to the list of references. + The reference parameter is . + + + Gets or sets the canonicalization algorithm that is used before signing for the current object. + The canonicalization algorithm used before signing for the current object. + + + Gets a object used for canonicalization. + A object used for canonicalization. + + is . + + + Copies the elements of this instance into an object, starting at a specified index in the array. + An object that holds the collection's elements. + The beginning index in the array where the elements are copied. + This method is not supported. + + + Gets the number of references in the current object. + The number of references in the current object. + This property is not supported. + + + Returns an enumerator that iterates through the collection of references. + An enumerator that iterates through the collection of references. + This method is not supported. + + + Returns the XML representation of the object. + The XML representation of the instance. + The property is . +-or- +The property is empty. + + + Gets or sets the ID of the current object. + The ID of the current object. + + + Gets a value that indicates whether the collection is read-only. + + if the collection is read-only; otherwise, . + This property is not supported. + + + Gets a value that indicates whether the collection is synchronized. + + if the collection is synchronized; otherwise, . + This property is not supported. + + + Loads a state from an XML element. + The XML element from which to load the state. + The parameter is . + The parameter is not a valid element. +-or- +The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Gets a list of the objects of the current object. + A list of the elements of the current object. + + + Gets or sets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets or sets the name of the algorithm used for signature generation and validation for the current object. + The name of the algorithm used for signature generation and validation for the current object. + + + Gets an object to use for synchronization. + An object to use for synchronization. + This property is not supported. + + + Provides a wrapper on a core XML signature object to facilitate creating XML signatures. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class from the specified XML document. + The object to use to initialize the new instance of . + The parameter is . +-or- +The parameter contains a null property. + + + Initializes a new instance of the class from the specified object. + The object to use to initialize the new instance of . + The parameter is . + + + Adds a object to the list of objects to be signed. + The object to add to the list of objects to be signed. + + + Adds a object to the object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + The object that describes a digest method, digest value, and transform to use for creating an XML digital signature. + + + Determines whether the property verifies using the public key in the signature. + + if the property verifies; otherwise, . + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified key. + The implementation of the property that holds the key to be used to verify the property. + + if the property verifies for the specified key; otherwise, . + The parameter is . + The property of the parameter does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Determines whether the property verifies for the specified message authentication code (MAC) algorithm. + The implementation of that holds the MAC to be used to verify the property. + + if the property verifies for the specified MAC; otherwise, . + The parameter is . + The property of the specified object is not valid. +-or- +The property is . +-or- +The cryptographic transform used to check the signature could not be created. + + + Determines whether the property verifies for the specified object and, optionally, whether the certificate is valid. + The object to use to verify the property. + + to verify the signature only; to verify both the signature and certificate. + + if the signature is valid; otherwise, . +-or- + if the signature and certificate are valid; otherwise, . + The parameter is . + A signature description could not be created for the parameter. + + + Determines whether the property verifies using the public key in the signature. + When this method returns, contains the implementation of that holds the public key in the signature. This parameter is passed uninitialized. + + if the property verifies using the public key in the signature; otherwise, . + The parameter is null. + The property of the public key in the signature does not match the property. +-or- +The signature description could not be created. +-or +The hash algorithm could not be created. + + + Computes an XML digital signature. + The property is . +-or- +The property is not a object or object. +-or- +The key could not be loaded. + + + Computes an XML digital signature using the specified message authentication code (MAC) algorithm. + A object that holds the MAC to be used to compute the value of the property. + The parameter is . + The object specified by the parameter is not an instance of . +-or- +The property of the specified object is not valid. +-or- +The cryptographic transform used to check the signature could not be created. + + + Gets or sets an object that defines the XML encryption processing rules. + An object that defines the XML encryption processing rules. + + + Returns the object with the specified ID from the specified object. + The object to retrieve the object from. + The ID of the object to retrieve from the object. + The object with the specified ID from the specified object, or if it could not be found. + + + Returns the public key of a signature. + An object that contains the public key of the signature, or if the key cannot be found. + The property is . + + + Returns the XML representation of a object. + The XML representation of the object. + The property is . +-or- +The property is . + + + Gets or sets the object of the current object. + The object of the current object. + + + Loads a state from an XML element. + The XML element to load the state from. + The parameter is . + The parameter does not contain a valid property. +-or- +The parameter does not contain a valid property. + + + Represents the object of the current object. + + + Represents the name of the installed key to be used for signing the object. + + + Sets the current object. + The current object. The defaults is a object. + + + Gets the names of methods whose canonicalization algorithms are explicitly allowed. + A collection of the names of methods that safely produce canonical XML. + + + Gets the object of the current object. + The object of the current object. + + + Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature. + + if the format is acceptable; otherwise, . + + + Gets the length of the signature for the current object. + The length of the signature for the current object. + + + Gets the signature method of the current object. + The signature method of the current object. + + + Gets the signature value of the current object. + A byte array that contains the signature value of the current object. + + + Gets the object of the current object. + The object of the current object. + + + Gets or sets the asymmetric algorithm key used for signing a object. + The asymmetric algorithm key used for signing the object. + + + Gets or sets the name of the installed key to be used for signing the object. + The name of the installed key to be used for signing the object. + + + Represents the Uniform Resource Identifier (URI) for the XML mode decryption transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the base 64 transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the Canonical XML transformation, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard canonicalization algorithm for XML digital signatures and includes comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for enveloped signature transformation. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for exclusive XML canonicalization, with comments. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard minimal canonicalization algorithm for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard namespace for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard signature method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-256 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-384 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the SHA-512 signature method variation for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the standard digest method for XML digital signatures. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the XML Path Language (XPath). This field is constant. + + + Represents the Uniform Resource Identifier (URI) for XSLT transformations. This field is constant. + + + Represents the Uniform Resource Identifier (URI) for the license transform algorithm used to normalize XrML licenses for signatures. + + + Represents the abstract base class from which all elements that can be used in an XML digital signature derive. + + + Initializes a new instance of the class. + + + Gets or sets the Uniform Resource Identifier (URI) that identifies the algorithm performed by the current transform. + The URI that identifies the algorithm performed by the current object. + + + Gets or sets an object that represents the document context under which the current object is running. + An object that represents the document context under which the current object is running. + + + When overridden in a derived class, returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + When overridden in a derived class, returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + When overridden in a derived class, returns the output of the current object. + The output of the current object. + + + When overridden in a derived class, returns the output of the current object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + + + Returns the XML representation of the current object. + The XML representation of the current object. + + + When overridden in a derived class, gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + When overridden in a derived class, parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + + + When overridden in a derived class, gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Gets or sets a object that contains the namespaces that are propagated into the signature. + A object that contains the namespaces that are propagated into the signature. + The property was set to . + + + Sets the current object. + The current object. This property defaults to an object. + + + Defines an ordered list of objects that is applied to unsigned content prior to digest calculation. + + + Initializes a new instance of the class. + + + Adds a transform to the list of transforms to be applied to the unsigned content prior to digest calculation. + The transform to add to the list of transforms. + + + Gets the number of transforms in the object. + The number of transforms in the object. + + + Returns an enumerator of the transforms in the object. + An enumerator of the transforms in the object. + + + Gets the transform at the specified index in the object. + The index into the object that specifies which transform to return. + The transform at the specified index in the object. + The parameter is greater than the number of transforms. + + + Specifies the order of XML Digital Signature and XML Encryption operations when both are performed on the same document. + + + Initializes a new instance of the class. + + + Adds a Uniform Resource Identifier (URI) to exclude from processing. + A Uniform Resource Identifier (URI) to exclude from processing + The parameter is . + + + Gets or sets an object that contains information about the keys necessary to decrypt an XML document. + An object that contains information about the keys necessary to decrypt an XML document. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + A decryption key could not be found. + + + Returns the output of the current object. + The type of the output to return. is the only valid type for this parameter. + The output of the current object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Determines whether the ID attribute of an object matches a specified value. + An object with an ID attribute to compare with . + The value to compare with the ID attribute of . + + if the ID attribute of the parameter matches the parameter; otherwise, . + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + The parameter is . +-or- +The Uniform Resource Identifier (URI) value of an object in was not found. +-or- +The length of the URI value of an object in is 0. +-or- +The first character of the URI value of an object in is not '#'. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the decoding transform as defined in Section 6.6.2 of the XMLDSIG specification. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns the digest associated with an object. + The object used to create a digest. + The digest associated with an object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because this element has no inner XML elements. + An object to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is a object and it is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Represents the enveloped signature transform for an XML digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + The containing XML document is . + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified as transform-specific content of a element and configures the internal state of the current object to match the element. + An to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. + The parameter is . + The containing XML document is . + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a value that determines whether to include comments. + + to include comments; otherwise, . + + + Initializes a new instance of the class specifying whether to include comments, and specifying a list of namespace prefixes. + + to include comments; otherwise, . + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Returns the digest associated with a object. + The object used to create a digest. + The digest associated with a object. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object as an object of the specified type. + The type of the output to return. This must be one of the types in the property. + The output of the current object as an object of the specified type. + The parameter is not a object. +-or- +The parameter does not derive from a object. + + + Gets or sets a string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + A string that contains namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that specifies transform-specific content for the current object. + + + When overridden in a derived class, loads the specified input into the current object. + The input to load into the current object. + The parameter is not a object. +-or- +The parameter is not an object. +-or- +The parameter is not an object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the exclusive C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), with comments. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class specifying a list of namespace prefixes to canonicalize using the standard canonicalization algorithm. + The namespace prefixes to canonicalize using the standard canonicalization algorithm. + + + Represents the XPath transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Returns an XML representation of the parameters of a object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object to load into the current object. + The parameter is . +-or- +The parameter does not contain an element. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; the methods of the current object return only objects of one of these types. + + + Represents the XSLT transform for a digital signature as defined by the W3C. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with comments, if specified. + + to include comments; otherwise, . + + + Returns an XML representation of the parameters of the object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of the current object. + The output of the current object. + + + Returns the output of the current object of type . + The type of the output to return. is the only valid type for this parameter. + The output of the current object of type . + The parameter is not a object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of valid input types for the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element and configures the internal state of the current object to match the element. + An object that encapsulates an XSLT style sheet to load into the current object. This style sheet is applied to the document loaded by the method. + The parameter is . +-or- +The parameter does not contain an object. + + + Loads the specified input into the current object. + The input to load into the current object. + + + Gets an array of types that are possible outputs from the methods of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + Represents the license transform algorithm used to normalize XrML licenses for signatures. + + + Initializes a new instance of the class. + + + Gets or sets the decryptor of the current object. + The decryptor of the current object. + + + Returns an XML representation of the parameters of an object that are suitable to be included as subelements of an XMLDSIG element. + A list of the XML nodes that represent the transform-specific content needed to describe the current object in an XMLDSIG element. + + + Returns the output of an object. + The output of the object. + + + Returns the output of an object. + The type of the output to return. is the only valid type for this parameter. + The output of the object. + The parameter is not an object. + + + Gets an array of types that are valid inputs to the method of the current object. + An array of types that are valid inputs to the method of the current object; you can pass only objects of one of these types to the method of the current object. + + + Parses the specified object as transform-specific content of a element; this method is not supported because the object has no inner XML elements. + An object that encapsulates the transform to load into the current object. + + + Loads the specified input into the current object. + The input to load into the current object. The type of the input object must be . + The context was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The element was not set before this transform was invoked. +-or- +The property was not set before this transform was invoked. + + + Gets an array of types that are valid outputs from the method of the current object. + An array of valid output types for the current object; only objects of one of these types are returned from the methods of the current object. + + + \ No newline at end of file diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/useSharedDesignerContext.txt b/packages/System.Security.Cryptography.Xml.4.7.1/useSharedDesignerContext.txt new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Cryptography.Xml.4.7.1/version.txt b/packages/System.Security.Cryptography.Xml.4.7.1/version.txt new file mode 100644 index 0000000..961a214 --- /dev/null +++ b/packages/System.Security.Cryptography.Xml.4.7.1/version.txt @@ -0,0 +1 @@ +e0e08bd541f891194017fe74e6b8daf2b550a5d7 diff --git a/packages/System.Security.Permissions.4.7.0/.signature.p7s b/packages/System.Security.Permissions.4.7.0/.signature.p7s new file mode 100644 index 0000000..fac60ad Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/.signature.p7s differ diff --git a/packages/System.Security.Permissions.4.7.0/LICENSE.TXT b/packages/System.Security.Permissions.4.7.0/LICENSE.TXT new file mode 100644 index 0000000..984713a --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/LICENSE.TXT @@ -0,0 +1,23 @@ +The MIT License (MIT) + +Copyright (c) .NET Foundation and Contributors + +All rights reserved. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/packages/System.Security.Permissions.4.7.0/System.Security.Permissions.4.7.0.nupkg b/packages/System.Security.Permissions.4.7.0/System.Security.Permissions.4.7.0.nupkg new file mode 100644 index 0000000..32f1543 Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/System.Security.Permissions.4.7.0.nupkg differ diff --git a/packages/System.Security.Permissions.4.7.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Security.Permissions.4.7.0/THIRD-PARTY-NOTICES.TXT new file mode 100644 index 0000000..77a243e --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/THIRD-PARTY-NOTICES.TXT @@ -0,0 +1,375 @@ +.NET Core uses third-party libraries or other resources that may be +distributed under licenses different than the .NET Core software. + +In the event that we accidentally failed to list a required notice, please +bring it to our attention. Post an issue or email us: + + dotnet@microsoft.com + +The attached notices are provided for information only. + +License notice for ASP.NET +------------------------------- + +Copyright (c) .NET Foundation. All rights reserved. +Licensed under the Apache License, Version 2.0. + +Available at +https://github.com/aspnet/AspNetCore/blob/master/LICENSE.txt + +License notice for Slicing-by-8 +------------------------------- + +http://sourceforge.net/projects/slicing-by-8/ + +Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + + +This software program is licensed subject to the BSD License, available at +http://www.opensource.org/licenses/bsd-license.html. + + +License notice for Unicode data +------------------------------- + +http://www.unicode.org/copyright.html#License + +Copyright © 1991-2017 Unicode, Inc. All rights reserved. +Distributed under the Terms of Use in http://www.unicode.org/copyright.html. + +Permission is hereby granted, free of charge, to any person obtaining +a copy of the Unicode data files and any associated documentation +(the "Data Files") or Unicode software and any associated documentation +(the "Software") to deal in the Data Files or Software +without restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, and/or sell copies of +the Data Files or Software, and to permit persons to whom the Data Files +or Software are furnished to do so, provided that either +(a) this copyright and permission notice appear with all copies +of the Data Files or Software, or +(b) this copyright and permission notice appear in associated +Documentation. + +THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF +ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT OF THIRD PARTY RIGHTS. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS +NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL +DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, +DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER +TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THE DATA FILES OR SOFTWARE. + +Except as contained in this notice, the name of a copyright holder +shall not be used in advertising or otherwise to promote the sale, +use or other dealings in these Data Files or Software without prior +written authorization of the copyright holder. + +License notice for Zlib +----------------------- + +https://github.com/madler/zlib +http://zlib.net/zlib_license.html + +/* zlib.h -- interface of the 'zlib' general purpose compression library + version 1.2.11, January 15th, 2017 + + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler + + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + +*/ + +License notice for Mono +------------------------------- + +http://www.mono-project.com/docs/about-mono/ + +Copyright (c) .NET Foundation Contributors + +MIT License + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the Software), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for International Organization for Standardization +----------------------------------------------------------------- + +Portions (C) International Organization for Standardization 1986: + Permission to copy in any form is granted for use with + conforming SGML systems and applications as defined in + ISO 8879, provided this notice is included in all copies. + +License notice for Intel +------------------------ + +"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this +list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, +this list of conditions and the following disclaimer in the documentation +and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License notice for Xamarin and Novell +------------------------------------- + +Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Copyright (c) 2011 Novell, Inc (http://www.novell.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Third party notice for W3C +-------------------------- + +"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE +Status: This license takes effect 13 May, 2015. +This work is being provided by the copyright holders under the following license. +License +By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. +Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: +The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. +Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. +Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." +Disclaimers +THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. +COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. +The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." + +License notice for Bit Twiddling Hacks +-------------------------------------- + +Bit Twiddling Hacks + +By Sean Eron Anderson +seander@cs.stanford.edu + +Individually, the code snippets here are in the public domain (unless otherwise +noted) — feel free to use them however you please. The aggregate collection and +descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are +distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and +without even the implied warranty of merchantability or fitness for a particular +purpose. + +License notice for Brotli +-------------------------------------- + +Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +compress_fragment.c: +Copyright (c) 2011, Google Inc. +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +decode_fuzzer.c: +Copyright (c) 2015 The Chromium Authors. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." + +License notice for Json.NET +------------------------------- + +https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md + +The MIT License (MIT) + +Copyright (c) 2007 James Newton-King + +Permission is hereby granted, free of charge, to any person obtaining a copy of +this software and associated documentation files (the "Software"), to deal in +the Software without restriction, including without limitation the rights to +use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of +the Software, and to permit persons to whom the Software is furnished to do so, +subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS +FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR +COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for vectorized base64 encoding / decoding +-------------------------------------------------------- + +Copyright (c) 2005-2007, Nick Galbreath +Copyright (c) 2013-2017, Alfred Klomp +Copyright (c) 2015-2017, Wojciech Mula +Copyright (c) 2016-2017, Matthieu Darbois +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + +- Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + +- Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED +TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.dll new file mode 100644 index 0000000..5a5f765 Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/lib/net461/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.dll new file mode 100644 index 0000000..76faf41 Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/lib/netcoreapp3.0/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.dll new file mode 100644 index 0000000..2a353ee Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/lib/netstandard2.0/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.dll new file mode 100644 index 0000000..86a1064 Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/ref/net461/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.dll new file mode 100644 index 0000000..0b9f80f Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/ref/netcoreapp3.0/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.dll b/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.dll new file mode 100644 index 0000000..e910d87 Binary files /dev/null and b/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.dll differ diff --git a/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.xml b/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.xml new file mode 100644 index 0000000..b6da9b7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/ref/netstandard2.0/System.Security.Permissions.xml @@ -0,0 +1,7207 @@ + + + + System.Security.Permissions + + + + Provides the ability to uniquely identify a manifest-activated application. This class cannot be inherited. + + + Initializes a new instance of the class. + The full name of the application. + + is . + + + Gets the location of the deployment manifest as a URL. + The URL of the deployment manifest. + + + Gets the full name of the application. + The full name of the application, also known as the display name. + + + Populates a object with the data needed to serialize the target object. + The to populate with data. + The ) structure for the serialization. + + + Returns the full name of the manifest-activated application. + The full name of the manifest-activated application. + + + Provides a permission structure that allows methods or classes to access configuration files. + + + Initializes a new instance of the class. + The permission level to grant. + The value of is neither nor . + + + Returns a new object with the same permission level. + A new with the same permission level. + + + Reads the value of the permission state from XML. + The configuration element from which the permission state is read. + + is . + The attribute for the given is neither nor . +-or- +The for the given does not equal "IPermission". +-or- +The attribute of the given is or is not the type name for . +-or- +The attribute for the given does not equal 1. + + + Returns the logical intersection between the object and a given object that implements the interface. + The object containing the permissions to perform the intersection with. + The logical intersection between the and a given object that implements . + + is not typed as . + + + Compares the object with an object implementing the interface. + The object to compare to. + + if the permission state is equal; otherwise, . + + is not typed as . + + + Indicates whether the permission state for the object is the value of the enumeration. + + if the permission state for the is the value of ; otherwise, . + + + Returns a object with attribute values based on the current object. + A with attribute values based on the current . + + + Returns the logical union of the object and an object that implements the interface. + The object to perform the union with. + The logical union of the and an object that implements . + + is not typed as . + + + Creates a object that either grants or denies the marked target permission to access sections of configuration files. + + + Initializes a new instance of the class. + The security action represented by an enumeration member of . Determines the permission state of the attribute. + + + Creates and returns an object that implements the interface. + An object that implements . + + + Enables a .NET Framework data provider to help ensure that a user has a security level adequate for accessing data. + + + Initializes a new instance of a class. + + + Initializes a new instance of a class using an existing . + An existing used to create a new . + + + Initializes a new instance of a class with the specified . + A security action associated with a custom security attribute. + + + Initializes a new instance of a class with the specified value. + One of the values. + + + Initializes a new instance of a class with the specified value, and a value indicating whether a blank password is allowed. + One of the values. + + to indicate that a blank password is allowed; otherwise, . + + + Adds access for the specified connection string to the existing state of the . + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the properties. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise, . + + + Removes all permissions that were previous added using the method. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Creates a new instance of the class. + A new object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Returns a new permission object representing the intersection of the current permission object and the specified permission object. + A permission object to intersect with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the intersection of the current permission object and the specified permission object. This new permission object is a null reference ( in Visual Basic) if the intersection is empty. + The parameter is not a null reference ( in Visual Basic) and is not an instance of the same class as the current permission object. + + + Returns a value indicating whether the current permission object is a subset of the specified permission object. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of the specified permission object, otherwise . + The parameter is an object that is not of the same type as the current permission object. + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Returns a new permission object that is the union of the current and specified permission objects. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The object is not the same type as the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the . + One of the security action values representing an action that can be performed by declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed; otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions; otherwise . + + + Enables the .NET Framework Data Provider for ODBC to help make sure that a user has a security level sufficient to access an ODBC data source. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds access for the specified connection string to the existing state of the permission. + A permitted connection string. + String that identifies connection string parameters that are allowed or disallowed. + One of the values. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class with one of the values. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Enables the .NET Framework Data Provider for OLE DB to help make sure that a user has a security level sufficient to access an OLE DB data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Returns the as an . + A copy of the current permission object. + + + This property has been marked as obsolete. Setting this property will have no effect. + This property has been marked as obsolete. Setting this property will have no effect. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Gets or sets a comma-delimited string that contains a list of supported providers. + A comma-delimited list of providers allowed by the security policy. + + + Enables the .NET Framework Data Provider for Oracle to help ensure that a user has a security level adequate to access an Oracle database. + + + Initializes a new instance of the class with one of the values. + One of the values. + + + Creates a new set of permissions. + The connection string. + The key restrictions. + One of the enumerations. + + + Gets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + A expression. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the permission can be represented as unrestricted without any knowledge of the permission semantics. + + if the permission can be represented as unrestricted. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed using declarative security. + + + Gets or sets a value indicating whether a blank password is allowed. + + if a blank password is allowed, otherwise . + + + Gets or sets a permitted connection string. + A permitted connection string. + + + Returns an object that is configured according to the attribute properties. + An object. + + + Identifies whether the list of connection string parameters identified by the property are the only connection string parameters allowed. + One of the values. + + + Gets or sets connection string parameters that are allowed or disallowed. + One or more connection string parameters that are allowed or disallowed. + + + Identifies whether the attribute should serialize the connection string. + + if the attribute should serialize the connection string; otherwise . + + + Identifies whether the attribute should serialize the set of key restrictions. + + if the attribute should serialize the set of key restrictions, otherwise . + + + Enables the .NET Framework Data Provider for SQL Server to help make sure that a user has a security level sufficient to access a data source. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class. + One of the values. + + + Initializes a new instance of the class. + One of the values. + Indicates whether a blank password is allowed. + + + Adds a new connection string and a set of restricted keywords to the object. + The connection string. + The key restrictions. + One of the enumerations. + + + Returns the as an . + A copy of the current permission object. + + + Associates a security action with a custom security attribute. + + + Initializes a new instance of the class. + One of the values representing an action that can be performed by using declarative security. + + + Returns a object that is configured according to the attribute properties. + A object. + + + Controls code access permissions for event logging. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels and the name of the computer to use. + One of the enumeration values that specifies an access level. + The name of the computer on which to read or write events. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects that represent permission entries. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the enumeration values that specifies the permission state (full access or no access to resources). + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A collection that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can create an event source, read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. + + + The can read existing logs, delete event sources or logs, respond to entries, clear an event log, listen to events, and access a collection of all event logs. This member is now obsolete, use instead. + + + The can read existing logs. This member is now obsolete, use instead. + + + The can read or write to existing logs, and create event sources and logs. This member is now obsolete, use instead. + + + The has no permissions. + + + The can write to existing logs, and create event sources and logs. + + + Allows declarative permission checks for event logging. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the property and the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which events might be read. + The name of the computer on which events might be read. The default is ".". + The computer name is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for an . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The name of the computer on which to read or write events. The property is set to this value. + The computer name is invalid. + + + Gets the name of the computer on which to read or write events. + The name of the computer on which to read or write events. + + + Gets the permission access levels used in the permissions request. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The to add. + The zero-based index of the added . + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified . + The to find. + + if the specified belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Allows control of code access permissions for . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access levels, the name of the computer to use, and the category associated with the performance counter. + One of the values. + The server on which the performance counter and its associate category reside. + The name of the performance counter category (performance object) with which the performance counter is associated. + + + Initializes a new instance of the class with the specified permission access level entries. + An array of objects. The property is set to this value. + + is . + + + Initializes a new instance of the class with the specified permission state. + One of the values. + The parameter is not a valid value of . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can read, write, and create categories. + + + The can read categories. + + + The can read and write categories. + + + The has no permissions. + + + The can read categories. + + + The can write categories. + + + Allows declarative performance counter permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Gets or sets the name of the performance counter category. + The name of the performance counter category (performance object). + The value is . + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the computer name for the performance counter. + The server on which the category of the performance counter resides. + The format is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. The default is . + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + A bitwise combination of the values. The property is set to this value. + The server on which the category of the performance counter resides. + The name of the performance counter category (performance object) with which this performance counter is associated. + + is . +-or- + is . + + is not a valid value. +-or- + is not a valid computer name. + + + Gets the name of the performance counter category (performance object). + The name of the performance counter category (performance object). + + + Gets the name of the server on which the category of the performance counter resides. + The name of the server on which the category resides. + + + Gets the permission access level of the entry. + A bitwise combination of the values. + + + Contains a strongly typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives this collection's permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry for which to search. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + Controls access to printers. This class cannot be inherited. + + + Initializes a new instance of the class with the level of printing access specified. + One of the values. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the values. + + is not a valid . + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Creates and returns a permission that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + + is an object that is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. This object must be of the same type as the current permission object. + + if the current permission object is a subset of ; otherwise, . + + is an object that is not of the same type as the current permission object. + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Gets or sets the code's level of printing access. + One of the values. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission that combines the permission object and the target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + + is an object that is not of the same type as the current permission object. + + + Allows declarative printing permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels, which are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the type of printing allowed. + One of the values. + The value is not one of the values. + + + Specifies the type of printing that code is allowed to do. + + + Provides full access to all printers. + + + Provides printing programmatically to the default printer, along with safe printing through semirestricted dialog box. is a subset of . + + + Prevents access to printers. is a subset of . + + + Provides printing only from a restricted dialog box. is a subset of . + + + Controls rights to access Domain Name System (DNS) servers on the network. + + + Creates a new instance of the class that either allows unrestricted DNS access or disallows DNS access. + One of the values. + + is not a valid value. + + + Creates an identical copy of the current permission instance. + A new instance of the class that is an identical copy of the current instance. + + + Reconstructs a instance from an XML encoding. + The XML encoding to use to reconstruct the instance. + + is . + + is not a element. + + + Creates a permission instance that is the intersection of the current permission instance and the specified permission instance. + The instance to intersect with the current instance. + A instance that represents the intersection of the current instance with the specified instance, or if the intersection is empty. If both the current instance and are unrestricted, this method returns a new instance that is unrestricted; otherwise, it returns . + + is neither a nor . + + + Determines whether the current permission instance is a subset of the specified permission instance. + The second instance to be tested for the subset relationship. + + if the current instance is unrestricted and is either or unrestricted; otherwise, . + + is neither a nor . + + + Checks the overall permission state of the object. + + if the instance was created with ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the security object, including state information. + + + Creates a permission instance that is the union of the current permission instance and the specified permission instance. + The instance to combine with the current instance. + A instance that represents the union of the current instance with the specified instance. If is , this method returns a copy of the current instance. If the current instance or is unrestricted, this method returns a instance that is unrestricted; otherwise, it returns a instance that is restricted. + + is neither a nor . + + + Specifies permission to request information from Domain Name Servers. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid . + + + Creates and returns a new instance of the class. + A that corresponds to the security declaration. + + + Defines an endpoint that is authorized by a instance. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Gets the DNS host name or IP address of the server that is associated with this endpoint. + A string that contains the DNS host name or IP address of the server. + + + Gets the network port number that is associated with this endpoint. + The network port number that is associated with this request, or . + + + Gets the transport type that is associated with this endpoint. + One of the values. + + + Specifies the level of access allowed to a Simple Mail Transport Protocol (SMTP) server. + + + Connection to an SMTP host on the default port (port 25). + + + Connection to an SMTP host on any port. + + + No access to an SMTP host. + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class with the specified state. + + if the new permission is unrestricted; otherwise, . + + + Initializes a new instance of the class using the specified access level. + One of the values. + + + Initializes a new instance of the class using the specified permission state value. + One of the values. + + + Gets the level of access to SMTP servers controlled by the permission. + One of the values. + + + Adds the specified access level value to the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + An that is identical to the current permission. + + + Sets the state of the permission using the specified XML encoding. + The XML encoding to use to set the state of the current permission. + + does not describe an object. +-or- + does not contain the required state information to reconstruct the permission. + + is . + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission. Returns if the intersection is empty or is . + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not an . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of the permission. + A that contains an XML encoding of the current permission. + + + Creates a permission that is the union of the current permission and the specified permission. + An to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not an . + + + Controls access to Simple Mail Transport Protocol (SMTP) servers. + + + Initializes a new instance of the class. + One of the values that specifies the permission behavior. + + is not a valid . + + + Gets or sets the level of access to SMTP servers controlled by the attribute. + A value. Valid values are "Connect" and "None". + + + Creates a permission object that can be stored with the in an assembly's metadata. + An instance. + + + Specifies network access permissions. + + + Indicates that the application is allowed to accept connections from the Internet on a local resource. Notice that this is a protection for the local host that uses Accept to grant access to a local resource (address/port). At the time a socket tries to bind to this local resource a permission check is performed to see if an Accept exists on that resource. + + + Indicates that the application is allowed to connect to specific Internet resources. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. This is because the port of a connecting remote host is unknown and not suitable permissions can be built in advance. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. + + + Specifies permission to access information about network interfaces and traffic statistics. + + + No access to network information. + + + Ping access to network information. + + + Read access to network information. + + + Controls access to network information and traffic statistics for the local computer. This class cannot be inherited. + + + Initializes a new instance of the class using the specified value. + One of the values. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets the level of access to network information controlled by this permission. + One of the values. + + + Adds the specified value to this permission. + One of the values. + + + Creates and returns an identical copy of this permission. + A that is identical to the current permission + + + Sets the state of this permission using the specified XML encoding. + A that contains the XML encoding to use to set the state of the current permission + + is . + + is not a permission encoding. +-or- + is not an encoding of a . +-or- + has invalid values. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + An to intersect with the current permission. It must be of the same type as the current permission. + A that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty or is . + + is not a . + + + Determines whether the current permission is a subset of the specified permission. + An that is to be tested for the subset relationship. This permission must be of the same type as the current permission + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the state of this permission. + A that contains the XML encoding of the current permission. + + + Creates a permission that is the union of this permission and the specified permission. + A permission to combine with the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class. + A value that specifies the permission behavior. + + + Gets or sets the network information access level. + A string that specifies the access level. + + + Creates and returns a new object. + A that corresponds to this attribute. + + + Specifies the values that define or are used in object permissions. + + + Initializes a new instance of the . The initial for this instance is passed when the constructor is called. + One of the values in the enumeration. + + + Creates and returns a copy of the current . + A that contains a copy of the current instance of . + + + Represents the XML object model for encoding security objects. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid permission element. + +The parameter does not contain a valid type or class. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + Permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The parameter is a reference ( in Visual Basic). + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + The parameter is a reference ( in Visual Basic). + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + Specifies a value. + + + Creates and returns a new . + A new object. + + + Specifies the values that are used in object permissions. + + + Initializes a new instance of the class with the supplied initial permission state. + One of the values in the enumeration. + + + Creates and returns an identical copy of the current . + An object with an IPermission interface, whose instance contains a copy of the current instance of . + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is not a valid element. + +The parameter's version number is not supported. + The parameter is a reference ( in Visual Basic). + + + Creates and returns a permission that is the intersection of the current and the specified permission. + A permission to with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current and the specified permission. This new permission is a reference ( in Visual Basic) if the intersection is empty. + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current is a subset of the specified permission; otherwise, . + The target parameter is not a reference ( in Visual Basic) and is not an instance of the same class as the current permission. + + + Returns a value specifying whether the current is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the and its current state. + A object that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the of the current and the specified permission. + + parameter is invalid. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A new object. + + + Specifies the different scopes of a PNRP cloud. + + + All IP addresses are allowed to register with the PNRP . There is no difference between any scope and all scopes. + + + The scope is global; all valid IP addresses are allowed to register with the PNRP . + + + The scope is link-local; only IP addresses defined for the local area subnet are allowed to register with the PNRP . + + + The scope is site-local; only IP addresses defined for the site are allowed to register with the PNRP. + + + Controls rights to make or accept connections on a transport address. + + + Initializes a new instance of the class for the given transport address with the specified permission. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Initializes a new instance of the class that allows unrestricted access to the or disallows access to the . + One of the values. + + + Gets a list of instances that identifies the endpoints that can be accepted under this permission instance. + An instance that implements the interface that contains instances. + + + Adds a permission to the set of permissions for a transport address. + One of the values. + One of the values. + The host name for the transport address. + The port number for the transport address. + + is . + + + Defines a constant that represents all ports. + + + Gets a list of instances that identifies the endpoints that can be connected to under this permission instance. + An instance that implements the interface that contains instances. + + + Creates a copy of a instance. + A new instance of the class that is a copy of the current instance. + + + Reconstructs a instance for an XML encoding. + The XML encoding used to reconstruct the instance. + The is . + The is not a permission element for this type. + + + Returns the logical intersection between two instances. + The instance to intersect with the current instance. + The instance that represents the intersection of two instances. If the intersection is empty, the method returns . If the parameter is a null reference, the method returns . + The parameter is not a . + + is not granted to the method caller. + + + Determines if the current permission is a subset of the specified permission. + A that is to be tested for the subset relationship. + If is , this method returns if the current instance defines no permissions; otherwise, . If is not , this method returns if the current instance defines a subset of permissions; otherwise, . + + is not a . + + is not granted to the method caller. + + + Checks the overall permission state of the object. + + if the instance is created with the value from ; otherwise, . + + + Creates an XML encoding of a instance and its current state. + A instance that contains an XML-encoded representation of the instance, including state information. + + + Returns the logical union between two instances. + The instance to combine with the current instance. + The instance that represents the union of two instances. If parameter is , it returns a copy of the current instance. + + is not a . + + + Specifies security actions to control connections. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not a valid value. + + + Gets or sets the network access method that is allowed by this . + A string that contains the network access method that is allowed by this instance of . Valid values are "Accept" and "Connect." + The property is not when you attempt to set the value. To specify more than one Access method, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + An instance of the class that corresponds to the security declaration. + One or more of the current instance's , , , or properties is . + + + Gets or sets the DNS host name or IP address that is specified by this . + A string that contains the DNS host name or IP address that is associated with this instance of . + + is not when you attempt to set the value. To specify more than one host, use an additional attribute declaration statement. + + + Gets or sets the port number that is associated with this . + A string that contains the port number that is associated with this instance of . + The property is when you attempt to set the value. To specify more than one port, use an additional attribute declaration statement. + + + Gets or sets the that is specified by this . + A string that contains the that is associated with this . + + is not when you attempt to set the value. To specify more than one transport type, use an additional attribute declaration statement. + + + Defines transport types for the and classes. + + + All transport types. + + + The transport type is connectionless, such as UDP. Specifying this value has the same effect as specifying . + + + The transport is connection oriented, such as TCP. Specifying this value has the same effect as specifying . + + + TCP transport. + + + UDP transport. + + + Controls rights to access HTTP Internet resources. + + + Creates a new instance of the class. + + + Initializes a new instance of the class with the specified access rights for the specified URI. + A NetworkAccess value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A URI string to which access rights are granted. + + is . + + + Initializes a new instance of the class with the specified access rights for the specified URI regular expression. + A value that indicates what kind of access to grant to the specified URI. indicates that the application is allowed to accept connections from the Internet on a local resource. indicates that the application is allowed to connect to specific Internet resources. + A regular expression that describes the URI to which access is to be granted. + + + Creates a new instance of the class that passes all demands or fails all demands. + A value. + + + This property returns an enumeration of a single accept permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains accept permissions. + + + Adds the specified URI string with the specified access rights to the current . + A that specifies the access rights that are granted to the URI. + A string that describes the URI to which access rights are granted. + + is . + + + Adds the specified URI with the specified access rights to the current . + A NetworkAccess that specifies the access rights that are granted to the URI. + A regular expression that describes the set of URIs to which access rights are granted. + The parameter is . + + + This property returns an enumeration of a single connect permissions held by this . The possible objects types contained in the returned enumeration are and . + The interface that contains connect permissions. + + + Creates a copy of a . + A new instance of the class that has the same values as the original. + + + Reconstructs a from an XML encoding. + The XML encoding from which to reconstruct the . + The parameter is + + is not a permission element for this type. + + + Returns the logical intersection of two instances. + The to compare with the current instance. + A new that represents the intersection of the current instance and the parameter. If the intersection is empty, the method returns . + + is not or of type + + + Determines whether the current is a subset of the specified object. + The to compare to the current . + + if the current instance is a subset of the parameter; otherwise, . If the target is , the method returns for an empty current permission that is not unrestricted and otherwise. + The target parameter is not an instance of . + The current instance contains a Regex-encoded right and there is not exactly the same right found in the target instance. + + + Checks the overall permission state of the . + + if the was created with the ; otherwise, . + + + Creates an XML encoding of a and its current state. + A that contains an XML-encoded representation of the , including state information. + + + Returns the logical union between two instances of the class. + The to combine with the current . + A that represents the union of the current instance and the parameter. If either is , the method returns a that is . If the target is , the method returns a copy of the current . + target is not or of type . + + + Specifies permission to access Internet resources. This class cannot be inherited. + + + Initializes a new instance of the class with a value that specifies the security actions that can be performed on this class. + One of the values. + + is not a valid value. + + + Gets or sets the URI string accepted by the current . + A string containing the URI accepted by the current . + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI accepted by the current . + A string containing a regular expression pattern that describes the URI accepted by the current . This string must be escaped according to the rules for encoding a constructor string. + + is not when you attempt to set the value. If you wish to specify more than one Accept URI, use an additional attribute declaration statement. + + + Gets or sets the URI connection string controlled by the current . + A string containing the URI connection controlled by the current . + + is not when you attempt to set the value. If you wish to specify more than one Connect URI, use an additional attribute declaration statement. + + + Gets or sets a regular expression pattern that describes the URI connection controlled by the current . + A string containing a regular expression pattern that describes the URI connection controlled by this . + + is not when you attempt to set the value. If you wish to specify more than one connect URI, use an additional attribute declaration statement. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Defines the underlying structure of all code access permissions. + + + Initializes a new instance of the class. + + + Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using can create security issues. + The calling code does not have . +-or- +There is already an active for the current frame. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Forces a at run time if all callers higher in the call stack have not been granted the permission specified by the current instance. + A caller higher in the call stack does not have the permission specified by the current instance. +-or- +A caller higher in the call stack has called on the current permission object. + + + Prevents callers higher in the call stack from using the code that calls this method to access the resource specified by the current instance. + There is already an active for the current frame. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified object is equal to the current ; otherwise, . + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter does not contain the XML encoding for an instance of the same type as the current instance. +-or- +The version number of the parameter is not supported. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Prevents callers higher in the call stack from using the code that calls this method to access all resources except for the resource specified by the current instance. + There is already an active for the current frame. + + + Causes all previous overrides for the current frame to be removed and no longer in effect. + There is no previous , , or for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Causes any previous for the current frame to be removed and no longer in effect. + There is no previous for the current frame. + + + Creates and returns a string representation of the current permission object. + A string representation of the current permission object. + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not . This method is only supported at this level when passed . + + + The exception that is thrown when a denied host resource is detected. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class using the provided serialization information and streaming context. + The object that holds the serialized object data. + Contextual information about the source or destination. + + is . + + + Initializes a new instance of the class with a specified error message. + The message that describes the error. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the innerException parameter is not , the current exception is raised in a block that handles the inner exception. + + + Initializes a new instance of the class with a specified error message, the protected host resources, and the host resources that caused the exception to be thrown. + The error message that explains the reason for the exception. + A bitwise combination of the enumeration values that specify the host resources that are inaccessible to partially trusted code. + A bitwise combination of the enumeration values that specify the demanded host resources. + + + Gets or sets the demanded host protection resources that caused the exception to be thrown. + A bitwise combination of the values identifying the protection resources causing the exception to be thrown. The default is . + + + Gets or sets the host protection resources that are inaccessible to partially trusted code. + A bitwise combination of the values identifying the inaccessible host protection categories. The default is . + + + Returns a string representation of the current host protection exception. + A string representation of the current . + + + Allows the control and customization of security behavior for application domains. + + + Initializes a new instance of the class. + + + Determines whether an application should be executed. + The evidence for the application to be activated. + Optionally, the evidence for the activating application domain. + The trust context. + An object that contains trust information about the application. + + is . + An object could not be found in the application evidence. +-or- +The property in the activation arguments is . + The grant set does not contain the minimum request set specified by the . + + + When overridden in a derived class, gets the security policy for the current application domain. + The security policy for the current application domain. The default is . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets the flag representing the security policy components of concern to the host. + One of the enumeration values that specifies security policy components. The default is . + + + Requests a specific evidence type for the application domain. + The evidence type. + The requested application domain evidence. + + + Requests a specific evidence type for the assembly. + The evidence type. + The target assembly. + The requested assembly evidence. + + + Determines which evidence types the host can supply for the application domain, if requested. + An array of evidence types. + + + Determines which evidence types the host can supply for the assembly, if requested. + The target assembly. + An array of evidence types. + + + Provides the application domain evidence for an assembly being loaded. + Additional evidence to add to the evidence. + The evidence to be used for the . + + + Provides the assembly evidence for an assembly being loaded. + The loaded assembly. + Additional evidence to add to the assembly evidence. + The evidence to be used for the assembly. + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The permission set that can be granted by the security system. + + is . + + + Specifies the security policy components to be used by the host security manager. + + + Use all security policy components. + + + Use the application domain evidence. + + + Use the assembly evidence. + + + Route calls to the method to the method first. + + + Use the policy level specified in the property. + + + Use the method to resolve the application evidence. + + + Use none of the security policy components. + + + Gets an object's . + + + Gets that verifies the current object's identity. + + of the current object's identity. + + + Supports the methods that convert permission object state to and from an XML element representation. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy-level context to resolve named permission set references. + + + Creates an XML encoding of the security object and its current state. + The policy-level context to resolve named permission set references. + The root element of the XML representation of the policy object. + + + Defines a permission set that has a name and description associated with it. This class cannot be inherited. + + + Initializes a new instance of the class from another named permission set. + The named permission set from which to create the new instance. + + + Initializes a new, empty instance of the class with the specified name. + The name for the new named permission set. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name in either an unrestricted or a fully restricted state. + The name for the new named permission set. + One of the values. + The parameter is or is an empty string (""). + + + Initializes a new instance of the class with the specified name from a permission set. + The name for the named permission set. + The permission set from which to take the value of the new named permission set. + The parameter is or is an empty string (""). + + + Creates a permission set copy from a named permission set. + A permission set that is a copy of the permissions in the named permission set. + + + Creates a copy of the named permission set with a different name but the same permissions. + The name for the new named permission set. + A copy of the named permission set with the new name. + The parameter is or is an empty string (""). + + + Gets or sets the text description of the current named permission set. + A text description of the named permission set. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a named permission set with a specified state from an XML encoding. + A security element containing the XML representation of the named permission set. + The parameter is not a valid representation of a named permission set. + The parameter is . + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the name of the current named permission set. + The name of the named permission set. + The name is or is an empty string (""). + + + Creates an XML element description of the named permission set. + The XML representation of the named permission set. + + + Controls the ability to access encrypted data and memory. This class cannot be inherited. + + + Initializes a new instance of the class with the specified permission flags. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified permission state. + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the data and memory protection flags. + A bitwise combination of the values. + The specified value is not a valid combination of the values. + + + Reconstructs a permission with a specific state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the data protection permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether data can be encrypted using the class. + + if data can be encrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be encrypted using the class. + + if memory can be encrypted; otherwise, . + + + Gets or sets a value indicating whether data can be unencrypted using the class. + + if data can be unencrypted; otherwise, . + + + Gets or sets a value indicating whether memory can be unencrypted using the class. + + if memory can be unencrypted; otherwise, . + + + Specifies the access permissions for encrypting data and memory. + + + The ability to encrypt data, encrypt memory, unencrypt data, and unencrypt memory. + + + No protection abilities. + + + The ability to encrypt data. + + + The ability to encrypt memory. + + + The ability to unencrypt data. + + + The ability to unencrypt memory. + + + Controls access to system and user environment variables. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the specified environment variables. + One of the values. + A list of environment variables (semicolon-separated) to which access is granted. + The parameter is . + The parameter is not a valid value of . + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Adds access for the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets all environment variables with the specified . + One of the values that represents a single type of environment variable access. + A list of environment variables (semicolon-separated) for the selected flag. + + is not a valid value of . +-or- + is , which represents more than one type of environment variable access, or , which does not represent any type of environment variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified environment variables to the existing state of the permission. + One of the values. + A list of environment variables (semicolon-separated). + The parameter is . + The parameter is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies access to environment variables. + + + + and access to environment variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + No access to environment variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Only read access to environment variables is specified. Changing, deleting and creating environment variables is not included in this access level. + + + Only write access to environment variables is specified. Write access includes creating and deleting environment variables as well as changing existing values. Reading environment variables is not included in this access level. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Sets full access for the environment variables specified by the string value. + A list of environment variables for full access. + The get method is not supported for this property. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Gets or sets read access for the environment variables specified by the string value. + A list of environment variables for read access. + + + Gets or sets write access for the environment variables specified by the string value. + A list of environment variables for write access. + + + Controls the ability to access files or folders through a File dialog box. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + The parameter is not a valid combination of the values. + + + Initializes a new instance of the class with either restricted or unrestricted permission, as specified. + One of the values ( or ). + The parameter is not a valid value of . + + + Gets or sets the permitted access to files. + The permitted access to files. + An attempt is made to set the parameter to a value that is not a valid combination of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of access to files allowed through the File dialog boxes. + + + No access to files through the File dialog boxes. + + + Ability to open files through the File dialog boxes. + + + Ability to open and save files through the File dialog boxes. + + + Ability to save files through the File dialog boxes. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets a value indicating whether permission to open files through the file dialog is declared. + + if permission to open files through the file dialog is declared; otherwise, . + + + Gets or sets a value indicating whether permission to save files through the file dialog is declared. + + if permission to save files through the file dialog is declared; otherwise, . + + + Controls the ability to access files and folders. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access to the designated file or directory and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories and the specified access rights to file control information. + A bitwise combination of the enumeration values. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with the specified access to the designated file or directory. + A bitwise combination of the enumeration values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter does not specify the absolute path to the file or directory. + + + Initializes a new instance of the class with the specified access to the designated files and directories. + A bitwise combination of the enumeration values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not a valid string. + + + Initializes a new instance of the class with fully restricted or unrestricted permission as specified. + One of the enumeration values. + The parameter is not a valid value of . + + + Adds access for the specified file or directory to the existing state of the permission. + A bitwise combination of the values. + The absolute path of a file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + The parameter is . + The parameter has an invalid format. + + + Adds access for the specified files and directories to the existing state of the permission. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the array is not valid. + An entry in the array has an invalid format. + The parameter is . + + + Gets or sets the permitted access to all files. + The set of file I/O flags for all files. + + + Gets or sets the permitted access to all local files. + The set of file I/O flags for all local files. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not compatible. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets all files and directories with the specified . + One of the values that represents a single type of file access. + An array containing the paths of the files and directories to which access specified by the parameter is granted. + + is not a valid value of . +-or- + is , which represents more than one type of file access, or , which does not represent any type of file access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets the specified access to the specified file or directory, replacing the existing state of the permission. + A bitwise combination of the values. + The absolute path of the file or directory. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. +-or- +The parameter did not specify the absolute path to the file or directory. + + + Sets the specified access to the specified files and directories, replacing the current state for the specified access with the new set of paths. + A bitwise combination of the values. + An array containing the absolute paths of the files and directories. + The parameter is not a valid value of . +-or- +An entry in the parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the type of file access requested. + + + + , , , and access to a file or directory. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Access to append material to a file or directory. access includes the ability to create a new file or directory. To create files, code must also be granted both and either or access. + + + No access to a file or directory. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Access to the information in the path itself. This helps protect sensitive information in the path, such as user names, as well as information about the directory structure revealed in the path. This value does not grant access to files or folders represented by the path. +For performance reasons, should only be granted to directories, not to files. For example, permission should be granted to paths such as C:\test and C:\test\\, not C:\test\example.txt. + + + Access to read from a file or directory. + + + Access to write to or delete a file or directory. access includes deleting and overwriting files or directories. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the file or directory that is specified by the string value. + The absolute path of the file or directory for full access. + The get method is not supported for this property. + + + Gets or sets the permitted access to all files. + A bitwise combination of the values that represents the permissions for all files. The default is . + + + Gets or sets the permitted access to all local files. + A bitwise combination of the values that represents the permissions for all local files. The default is . + + + Gets or sets append access for the file or directory that is specified by the string value. + The absolute path of the file or directory for append access. + + + Gets or sets the file or directory in which access control information can be changed. + The absolute path of the file or directory in which access control information can be changed. + + + Creates and returns a new . + A that corresponds to this attribute. + The path information for a file or directory for which access is to be secured contains invalid characters or wildcard specifiers. + + + Gets or sets the file or directory to which to grant path discovery. + The absolute path of the file or directory. + + + Gets or sets read access for the file or directory specified by the string value. + The absolute path of the file or directory for read access. + + + Gets or sets the file or directory in which access control information can be viewed. + The absolute path of the file or directory in which access control information can be viewed. + + + Gets or sets the file or directory in which file data can be viewed and modified. + The absolute path of the file or directory in which file data can be viewed and modified. + The accessor is called. The accessor is provided only for C# compiler compatibility. + + + Gets or sets write access for the file or directory specified by the string value. + The absolute path of the file or directory for write access. + + + Defines the identity permission for files originating in the global assembly cache. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with fully restricted . + One of the values. + + is not a valid value. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates a permission from an XML encoding. + A that contains the XML encoding to use to create the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. The new permission is if the intersection is empty. + + is not and is not of the same type as the current permission. + + + Indicates whether the current permission is a subset of the specified permission. + A permission object to test for the subset relationship. The permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + A that represents the XML encoding of the permission, including any state information. + + + Creates and returns a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified value. + One of the values. + The parameter is not a valid value. + + + Creates a new object. + A that corresponds to this attribute. + + + Allows the use of declarative security actions to determine host protection requirements. This class cannot be inherited. + + + Initializes a new instance of the class with default values. + + + Initializes a new instance of the class with the specified value. + One of the values. + + is not . + + + Creates and returns a new host protection permission. + An that corresponds to the current attribute. + + + Gets or sets a value indicating whether external process management is exposed. + + if external process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether external threading is exposed. + + if external threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether resources might leak memory if the operation is terminated. + + if resources might leak memory on termination; otherwise, . + + + Gets or sets flags specifying categories of functionality that are potentially harmful to the host. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the security infrastructure is exposed. + + if the security infrastructure is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting process management is exposed. + + if self-affecting process management is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether self-affecting threading is exposed. + + if self-affecting threading is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether shared state is exposed. + + if shared state is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether synchronization is exposed. + + if synchronization is exposed; otherwise, . The default is . + + + Gets or sets a value indicating whether the user interface is exposed. + + if the user interface is exposed; otherwise, . The default is . + + + Specifies categories of functionality potentially harmful to the host if invoked by a method or class. + + + Exposes all host resources. + + + Might create or destroy other processes. + + + Creates or manipulates threads other than its own, which might be harmful to the host. + + + Might cause a resource leak on termination, if not protected by a safe handle or some other means of ensuring the release of resources. + + + Exposes no host resources. + + + Exposes the security infrastructure. + + + Might exit the current process, terminating the server. + + + Manipulates threads in a way that only affects user code. + + + Exposes state that might be shared between threads. + + + Exposes synchronization. + + + Exposes the user interface. + + + Specifies the permitted use of isolated storage. + + + Unlimited administration ability for the user store. Allows browsing and deletion of the entire user store, but not read access other than the user's own domain/assembly identity. + + + Storage is isolated first by computer and then by application. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by application. Storage is also isolated by computer. This provides a data store for the application that is accessible in any domain context. The per-application data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by code assembly. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by assembly evidence. Storage will roam if Windows user data roaming is enabled. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by user and then by code assembly. Storage is also isolated by computer. This provides a data store for the assembly that is accessible in any domain context. The per-assembly data compartment requires additional trust because it potentially provides a "tunnel" between applications that could compromise the data isolation of applications in particular Web sites. + + + Storage is isolated first by computer and then by domain and assembly. Data can only be accessed within the context of the same application and only when run on the same computer. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage will roam if Windows user data roaming is enabled. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Storage is isolated first by user and then by domain and assembly. Storage is also isolated by computer. Data can only be accessed within the context of the same application and only when run by the same user. This is helpful when a third-party assembly wants to keep a private data store. + + + Use of isolated storage is not allowed. + + + Use of isolated storage is allowed without restriction. Code has full access to any part of the user store, regardless of the identity of the domain or assembly. This use of isolated storage includes the ability to enumerate the contents of the isolated storage data store. + + + Specifies the allowed usage of a private virtual file system. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission object. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + An that corresponds to this attribute. + + + Represents access to generic isolated storage capabilities. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Gets or sets the type of isolated storage containment allowed. + One of the values. + + + Gets or sets the quota on the overall size of each user's total store. + The size, in bytes, of the resource allocated to the user. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the level of isolated storage that should be declared. + One of the values. + + + Gets or sets the maximum user storage quota size. + The maximum user storage quota size in bytes. + + + Allows a permission to expose an unrestricted state. + + + Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Controls the ability to access key containers. This class cannot be inherited. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of the values. + + + Initializes a new instance of the class with the specified global access and specific key container access rights. + A bitwise combination of the values. + An array of objects identifying specific key container access rights. + + is not a valid combination of the values. + + is . + + + Initializes a new instance of the class with either restricted or unrestricted permission. + One of the values. + + is not a valid value. + + + Gets the collection of objects associated with the current permission. + A containing the objects for this . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets the key container permission flags that apply to all key containers associated with the permission. + A bitwise combination of the values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding used to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number of is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and does not specify a permission of the same type as the current permission. + + + Determines whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and does not specify a permission of the same type as the current permission. + + + Specifies access rights for specific key containers. This class cannot be inherited. + + + Initializes a new instance of the class, using the specified cryptographic service provider (CSP) parameters and access permissions. + A object that contains the cryptographic service provider (CSP) parameters. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class, using the specified key container name and access permissions. + The name of the key container. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Initializes a new instance of the class with the specified property values. + The name of the key store. + The name of the provider. + The type code for the provider. See the property for values. + The name of the key container. + The key specification. See the property for values. + A bitwise combination of the values. + The resulting entry would have unrestricted access. + + + Determines whether the specified object is equal to the current instance. + The object to compare with the current instance. + + if the specified is equal to the current object; otherwise, . + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets a hash code for the current instance that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the key container name. + The name of the key container. + The resulting entry would have unrestricted access. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Gets or sets the name of the key store. + The name of the key store. + The resulting entry would have unrestricted access. + + + Gets or sets the provider name. + The name of the provider. + The resulting entry would have unrestricted access. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + The resulting entry would have unrestricted access. + + + Represents a collection of objects. This class cannot be inherited. + + + + Adds a object to the collection. + The object to add. + The index at which the new element was inserted. + + is . + + + Removes all the objects from the collection. + + + + + + + Copies the elements of the collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array that is the destination of the elements copied from the current collection. + The index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the collection is greater than the available space from to the end of the destination . + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Gets the index in the collection of the specified object, if it exists in the collection. + The object to locate. + The index of the specified object in the collection, or -1 if no match is found. + + + Gets a value indicating whether the collection is synchronized (thread safe). + + in all cases. + + + Gets the item at the specified index in the collection. + The zero-based index of the element to access. + The object at the specified index in the collection. + + is greater than or equal to the collection count. + + is negative. + + + Removes the specified object from the collection. + The object to remove. + + is . + + + Gets an object that can be used to synchronize access to the collection. + An object that can be used to synchronize access to the collection. + + + Returns a object that can be used to iterate through the objects in the collection. + A object that can be used to iterate through the collection. + + + Represents the enumerator for objects in a . + + + + Gets the current entry in the collection. + The current object in the collection. + The property is accessed before first calling the method. The cursor is located before the first object in the collection. +-or- +The property is accessed after a call to the method returns , which indicates that the cursor is located after the last object in the collection. + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current object in the collection. + The current object in the collection. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets the key container permissions. + A bitwise combination of the values. The default is . + + + Gets or sets the name of the key container. + The name of the key container. + + + Gets or sets the key specification. + One of the AT_ values defined in the Wincrypt.h header file. + + + Gets or sets the name of the key store. + The name of the key store. The default is "*". + + + Gets or sets the provider name. + The name of the provider. + + + Gets or sets the provider type. + One of the PROV_ values defined in the Wincrypt.h header file. + + + Specifies the type of key container access allowed. + + + Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container. + + + Change the access control list (ACL) for a key container. + + + Create a key container. +Creating a key container also creates a file on disk. It is very important that any key container that is created is removed when it is no longer in use. + + + Decrypt a key container. +Decryption is a privileged operation because it uses the private key. + + + Delete a key container. +Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key. Therefore, deletion is a privileged operation. + + + Export a key from a key container. +The ability to export a key is potentially harmful because it removes the exclusivity of the key. + + + Import a key into a key container.The ability to import a key can be as harmful as the ability to delete a container because importing a key into a named key container replaces the existing key. + + + No access to a key container. + + + Open a key container and use the public key. + + does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files. Only the owner of the key is able to decrypt these files using the private key. + + + Sign a file using a key. +The ability to sign a file is potentially harmful because it can allow a user to sign a file using another user's key. + + + View the access control list (ACL) for a key container. + + + The describes a set of security permissions that controls the ability for audio, image, and video media to work in a partial-trust Windows Presentation Foundation (WPF) application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying the audio permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the audio, video, and image permission levels. + An enumerated value of . + An enumerated value of . + An enumerated value of . + + + Initializes a new instance of the class by specifying the image permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying the video permission level. + An enumerated value of . + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Gets the current value of the audio permission level. + The audio permission level. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Gets the current value of the image permission level. + The image permission level. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the audio, image, and video permissions are all unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Gets the current value of the video permission level. + The media permission level. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of . + One of the values. + + + Gets or sets the audio permission level for the . + The state of the . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the image permission level for the . + The state of the . + + + Gets or sets the video permission level for the . + The state of the . + + + Specifies the permission level for audio. + + + Permission that allows unrestricted audio playback. + + + Permission that denies all audio playback. + + + Permission that allows safe, limited audio playback, which includes denying stream access to the image file. + + + Permission that only allows audio playback of files that are located at the application's site of origin. + + + Specifies the permission level for images. + + + Permission that allows unrestricted image display. + + + Permission that denies all images to be displayed. + + + Permission that allows safe, limited image display, which includes denying stream access to the image file. + + + Permission that only allows display of images that are located at the application's site of origin. + + + Specifies the permission level for video. + + + Permission that allows unrestricted video playback. + + + Permission that denies all video playback. + + + Permission that allows safe, limited video playback, which includes denying stream access to the image file. + + + Permission that only allows video playback of files that are located at the application's site of origin. + + + Allows security actions for a to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the enumeration values that specifies a security action. + + + This method is not used. + A null reference ( in Visual Basic) in all cases. + + + Creates and returns a new permission set based on this permission set attribute object. + A new permission set. + + + Gets or sets a file containing the XML representation of a custom permission set to be declared. + The physical path to the file containing the XML representation of the permission set. + + + Gets or sets the hexadecimal representation of the XML encoded permission set. + The hexadecimal representation of the XML encoded permission set. + + + Gets or sets the name of the permission set. + The name of an immutable (one of several permission sets that are contained in the default policy and cannot be altered). + + + Gets or sets a value indicating whether the file specified by is Unicode or ASCII encoded. + + if the file is Unicode encoded; otherwise, . + + + Gets or sets the XML representation of a permission set. + The XML representation of a permission set. + + + Allows checks against the active principal (see ) using the language constructs defined for both declarative and imperative security actions. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Initializes a new instance of the class for the specified and . + The name of the object's user. + The role of the object's user (for example, Administrator). + + + Initializes a new instance of the class for the specified , , and authentication status. + The name of the object's user. + The role of the object's user (for example, Administrator). + + to signify that the user is authenticated; otherwise, . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Determines at run time whether the current principal matches the principal specified by the current permission. + The current principal does not pass the security check for the principal specified by the current permission. +-or- +The current is . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission will be if the intersection is empty. + The parameter is not and is not an instance of the same class as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is an object that is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates and returns a string representing the current permission. + A representation of the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is an object that is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider. + + if the current principal has been authenticated; otherwise, . + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the name of the identity associated with the current principal. + A name to match against that provided by the underlying role-based security provider. + + + Gets or sets membership in a specified security role. + The name of a role from the underlying role-based security provider. + + + Represents the identity of a software publisher. This class cannot be inherited. + + + Initializes a new instance of the class with the specified Authenticode X.509v3 certificate. + An X.509 certificate representing the software publisher's identity. + The parameter is . + The parameter is not a valid certificate. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Gets or sets an Authenticode X.509v3 certificate that represents the identity of the software publisher. + An X.509 certificate representing the identity of the software publisher. + The is . + The is not a valid certificate. + The property cannot be set because the identity is ambiguous. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets a certification file containing an Authenticode X.509v3 certificate. + The file path of an X.509 certificate file (usually has the extension.cer). + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets a signed file from which to extract an Authenticode X.509v3 certificate. + The file path of a file signed with the Authenticode signature. + + + Gets or sets an Authenticode X.509v3 certificate that identifies the publisher of the calling code. + A hexadecimal representation of the X.509 certificate. + + + Controls access to non-public types and members through the APIs. Controls some features of the APIs. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access. + One of the values. + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of reflection allowed for the current permission. + The set flags for the current permission. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the current allowed uses of reflection. + One or more of the values combined using a bitwise OR. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Gets or sets a value that indicates whether invocation of operations on non-public members is allowed. + + if invocation of operations on non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether use of certain features in , such as emitting debug symbols, is allowed. + + if use of the affected features is allowed; otherwise, . + + + Gets or sets a value that indicates whether restricted invocation of non-public members is allowed. Restricted invocation means that the grant set of the assembly that contains the non-public member that is being invoked must be equal to, or a subset of, the grant set of the invoking assembly. + + if restricted invocation of non-public members is allowed; otherwise, . + + + Gets or sets a value that indicates whether reflection on members that are not visible is allowed. + + if reflection on members that are not visible is allowed; otherwise, . + + + Specifies the permitted use of the and namespaces. + + + + , , and are set. does not include . + + + Invocation operations on all members are allowed, regardless of grant set. If this flag is not set, invocation operations are allowed only on visible members. + + + Enumeration of types and members is allowed. Invocation operations are allowed on visible types and members. + + + Emitting debug symbols is allowed. Beginning with the .NET Framework 2.0 Service Pack 1, this flag is no longer required to emit code. + + + Restricted member access is provided for partially trusted code. Partially trusted code can access nonpublic types and members, but only if the grant set of the partially trusted code includes all permissions in the grant set of the assembly that contains the nonpublic types and members being accessed. This flag is new in the .NET Framework 2.0 SP1. + + + This flag is obsolete. No flags are necessary to enumerate types and members and to examine their metadata. Use instead. + + + Controls the ability to access registry variables. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified access to the specified registry variables and the specified access rights to registry control information. + One of the values. + A bitwise combination of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Initializes a new instance of the class with the specified access to the specified registry variables. + One of the values. + A list of registry variables (semicolon-separated) to which access is granted. + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission, specifying registry permission access and access control actions. + One of the values. + One of the values. + A list of registry variables (separated by semicolons). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Adds access for the specified registry variables to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Gets paths for all registry variables with the specified . + One of the values that represents a single type of registry variable access. + A list of the registry variables (semicolon-separated) with the specified . + + is not a valid value of . +-or- + is , which represents more than one type of registry variable access, or , which does not represent any type of registry variable access. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Sets new access for the specified registry variable names to the existing state of the permission. + One of the values. + A list of registry variables (semicolon-separated). + The parameter is not a valid value of . +-or- +The parameter is not a valid string. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Specifies the permitted access to registry keys and values. + + + + , , and access to registry variables. represents multiple values and causes an when used as the parameter for the method, which expects a single value. + + + Create access to registry variables. + + + No access to registry variables. represents no valid values and causes an when used as the parameter for , which expects a single value. + + + Read access to registry variables. + + + Write access to registry variables. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid . + + + Gets or sets full access for the specified registry keys. + A semicolon-separated list of registry key paths, for full access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets change access control for the specified registry keys. + A semicolon-separated list of registry key paths, for change access control. . + + + Gets or sets create-level access for the specified registry keys. + A semicolon-separated list of registry key paths, for create-level access. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets read access for the specified registry keys. + A semicolon-separated list of registry key paths, for read access. + + + Gets or sets view access control for the specified registry keys. + A semicolon-separated list of registry key paths, for view access control. + + + Gets or sets a specified set of registry keys that can be viewed and modified. + A semicolon-separated list of registry key paths, for create, read, and write access. + The get accessor is called; it is only provided for C# compiler compatibility. + + + Gets or sets write access for the specified registry keys. + A semicolon-separated list of registry key paths, for write access. + + + Allows control of code access security permissions. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified level of access to resources at creation. + One of the values. + The parameter is not a valid value of . + + + Adds a permission entry to the permission. + The to add. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is already included in the permission. + + + Specifies the character to be used to represent the any wildcard character. + + + Clears the permission of the added permission entries. + + + Creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is not a valid permission element. +-or- +The version number of the parameter is not supported. + The parameter is . + + + Returns an array of the objects added to this permission. + An array of objects that were added to this permission. + + + Creates and returns a permission object that is the intersection of the current permission object and a target permission object. + A permission object of the same type as the current permission object. + A new permission object that represents the intersection of the current object and the specified target. This object is if the intersection is empty. + The target permission object is not of the same type as the current permission object. + + + Determines whether the current permission object is a subset of the specified permission. + A permission object that is to be tested for the subset relationship. + + if the current permission object is a subset of the specified permission object; otherwise, . + + + Gets a value indicating whether the permission is unrestricted. + + if permission is unrestricted; otherwise, . + + + Specifies the character to be used to represent a local reference. + + + Gets or sets an enumeration value that describes the types of access that you are giving the resource. + An enumeration value that is derived from and describes the types of access that you are giving the resource. + The property value is . + The property value is not an enumeration value. + + + Removes a permission entry from the permission. + The to remove. + The specified is . + The number of elements in the property is not equal to the number of elements in the property. +-or- +The is not in the permission. + + + Gets or sets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are trying to protect. + The property value is . + The length of the array is 0. + + + Creates and returns an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates a permission object that combines the current permission object and the target permission object. + A permission object to combine with the current permission object. It must be of the same type as the current permission object. + A new permission object that represents the union of the current permission object and the specified permission object. + The permission object is not of the same type as the current permission object. + + + Defines the smallest unit of a code access security permission set. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access and permission access path. + The integer representation of the permission access level enumeration value. The property is set to this value. + The array of strings that identify the resource you are protecting. The property is set to this value. + The specified is . + + + Gets an integer representation of the access level enumeration value. + The access level enumeration value. + + + Gets an array of strings that identify the resource you are protecting. + An array of strings that identify the resource you are protecting. + + + Describes a set of security permissions applied to code. This class cannot be inherited. + + + Initializes a new instance of the class with either restricted or unrestricted permission as specified. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified initial set state of the flags. + The initial state of the permission, represented by a bitwise OR combination of any permission bits defined by . + The parameter is not a valid value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the security permission flags. + The state of the current permission, represented by a bitwise OR combination of any permission bits defined by . + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not supported. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission object that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Defines the identity permission for the Web site from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified site identity. + The site name or wildcard expression. + The parameter is not a valid string, or does not match a valid wildcard site name. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the current site. + The current site. + The site identity cannot be retrieved because it has an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The permissions are not equal and one is not a subset of the other. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of . + A that corresponds to this attribute. + + + Gets or sets the site name of the calling code. + The site name to compare against the site name specified by the security provider. + + + Controls access to stores containing X.509 certificates. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted permission state. + One of the values. + + is not a valid value. + + + Initializes a new instance of the class with the specified access. + A bitwise combination of the values. + + is not a valid combination of values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Gets or sets the type of access allowed by the current permission. + A bitwise combination of the values. + An attempt is made to set this property to an invalid value. See for the valid values. + + + Reconstructs a permission with a specified state from an XML encoding. + A that contains the XML encoding to use to reconstruct the permission. + + is . + + is not a valid permission element. +-or- +The version number in is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + s not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + A that contains an XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + is not and is not of the same type as the current permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified security action. + One of the values. + + + Gets or sets a value indicating whether the code is permitted to add to a store. + + if the ability to add to a store is allowed; otherwise, . + + + Creates and returns a new . + A that corresponds to the attribute. + + + Gets or sets a value indicating whether the code is permitted to create a store. + + if the ability to create a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to delete a store. + + if the ability to delete a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate the certificates in a store. + + if the ability to enumerate certificates is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to enumerate stores. + + if the ability to enumerate stores is allowed; otherwise, . + + + Gets or sets the store permissions. + A bitwise combination of the values. The default is . + + + Gets or sets a value indicating whether the code is permitted to open a store. + + if the ability to open a store is allowed; otherwise, . + + + Gets or sets a value indicating whether the code is permitted to remove a certificate from a store. + + if the ability to remove a certificate from a store is allowed; otherwise, . + + + Specifies the permitted access to X.509 certificate stores. + + + The ability to add a certificate to a store. +For security reasons, this ability should be granted only to highly trusted code. + + + The ability to perform all certificate and store operations. + + + The ability to create a new store. +New stores are created by calling the method. + + + The ability to delete a store. +This functionality is not exposed by the class. + + + The ability to enumerate the certificates in a store. +For privacy reasons, this ability should be granted only to fully trusted code. + + + The ability to enumerate the stores on a computer. +This functionality is not exposed by the class. + + + Permission is not given to perform any certificate or store operations. + + + The ability to open a store. +The ability to open a store does not include the ability to enumerate certificates (which raises privacy concerns) or to add or remove certificates (which raises security concerns). + + + The ability to remove a certificate from a store. +This ability should be granted only to highly trusted code because removing a certificate can result in a denial of service. + + + Defines the identity permission for strong names. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class for the specified strong name identity. + The public key defining the strong name identity namespace. + The simple name part of the strong name identity. This corresponds to the name of the assembly. + The version number of the identity. + The parameter is . + The parameter is an empty string (""). + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission, or if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the simple name portion of the strong name identity. + The simple name of the identity. + The value is an empty string (""). + The property value cannot be retrieved because it contains an ambiguous identity. + + + Gets or sets the public key blob that defines the strong name identity namespace. + A that contains the public key of the identity, or if there is no key. + The property value is set to . + The property value cannot be retrieved because it contains an ambiguous identity. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and one is a subset of the other. + + + Gets or sets the version number of the identity. + The version of the identity. + The property value cannot be retrieved because it contains an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + The method failed because the key is . + + + Gets or sets the name of the strong name identity. + A name to compare against the name specified by the security provider. + + + Gets or sets the public key value of the strong name identity expressed as a hexadecimal string. + The public key value of the strong name identity expressed as a hexadecimal string. + + + Gets or sets the version of the strong name identity. + The version number of the strong name identity. + + + Represents the public key information (called a blob) for a strong name. This class cannot be inherited. + + + Initializes a new instance of the class with raw bytes of the public key blob. + The array of bytes representing the raw public key data. + The parameter is . + + + Gets or sets a value indicating whether the current public key blob is equal to the specified public key blob. + An object containing a public key blob. + + if the public key blob of the current object is equal to the public key blob of the parameter; otherwise, . + + + Returns a hash code based on the public key. + The hash code based on the public key. + + + Creates and returns a string representation of the public key blob. + A hexadecimal version of the public key blob. + + + Defines partial-trust access to the class. + + + Initializes a new instance of the class. + The to request. Only and are valid. + + is not a valid permission state. Only and are valid. + + + Initializes a new instance of the class with the specified permission flags. + The permission flags to request. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Gets or sets the for the type descriptor. + The for the type descriptor. + + + When overridden in a derived class, reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + When implemented by a derived class, determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Gets a value that indicates whether the type descriptor may be called from partially trusted code. + + if the property is set to ; otherwise, . + + + When overridden in a derived class, creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + When overridden in a derived class, creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Determines the permission flags that apply to a . + + + Initializes a new instance of the class with the specified . + One of the values. + + + When overridden in a derived class, creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets the for the . + The for the . + + + Gets or sets a value that indicates whether the type descriptor can be accessed from partial trust. + + if the type descriptor can be accessed from partial trust; otherwise, . + + + Defines permission settings for type descriptors. + + + No permission flags are set on the type descriptor. + + + The type descriptor may be called from partially trusted code. + + + Controls the permissions related to user interfaces and the Clipboard. This class cannot be inherited. + + + Initializes a new instance of the class with either fully restricted or unrestricted access, as specified. + One of the enumeration values. + The parameter is not a valid . + + + Initializes a new instance of the class with the permissions for the Clipboard, and no access to windows. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the permissions for windows, and no access to the Clipboard. + One of the enumeration values. + The parameter is not a valid value. + + + Initializes a new instance of the class with the specified permissions for windows and the Clipboard. + One of the enumeration values. + One of the enumeration values. + The parameter is not a valid value. +-or- +The parameter is not a valid value. + + + Gets or sets the Clipboard access represented by the permission. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. + + + Returns a value indicating whether the current permission is unrestricted. + + if the current permission is unrestricted; otherwise, . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the permission and the specified permission. + A permission to combine with the current permission. It must be the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. + + + Gets or sets the window access represented by the permission. + One of the values. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Gets or sets the type of access to the clipboard that is permitted. + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the type of access to the window resources that is permitted. + One of the values. + + + Specifies the type of clipboard access that is allowed to the calling code. + + + Clipboard can be used without restriction. + + + Clipboard cannot be used. + + + The ability to put data on the clipboard (, ) is unrestricted. Intrinsic controls that accept , such as text box, can accept the clipboard data, but user controls that must programmatically read the clipboard cannot. + + + Specifies the type of windows that code is allowed to use. + + + Users can use all windows and user input events without restriction. + + + Users cannot use any windows or user interface events. No user interface can be used. + + + Users can only use for drawing, and can only use user input events for user interface within that subwindow. Examples of are a , common dialog controls, and a control displayed within a browser. + + + Users can only use and for drawing, and can only use user input events for the user interface within those top-level windows and subwindows. See the Remarks section for more information. + + + Defines the identity permission for the URL from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the URL identity described by . + A URL or wildcard expression. + The parameter is . + The length of the parameter is zero. + The URL, directory, or site portion of the parameter is not valid. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not and is not of the same type as the current permission. +-or- +The Url property is not a valid URL. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The property is not a valid URL. +-or- +The two permissions are not equal and one is not a subset of the other. + The operation is ambiguous because the permission represents multiple identities. + + + Gets or sets a URL representing the identity of Internet code. + A URL representing the identity of Internet code. + The URL cannot be retrieved because it has an ambiguous identity. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets the full URL of the calling code. + The URL to match with the URL specified by the host. + + + The object controls the ability to create the WebBrowser control. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by specifying a permission state. + An enumerated value of . + + + Initializes a new instance of the class by specifying the Web browser permission level. + An enumerated value of . + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + The intersection of two permissions is a permission that describes the state that they both describe in common. Only a demand that passes both original permissions will be valid for the intersected permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + + + Returns a value indicating whether the current permission is unrestricted. + + if the property is set to ; otherwise, . + + + Gets or sets the current value of the Web browser permission level. + The current value of the Web browser permission level. + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new instance of the class. + A corresponding to the security declaration. + + + Gets or sets the current Web browser permission level for the . + The state of the current Web browser permission level. + + + Specifies the permission level for a Web browser. + + + A Web browser that cannot navigate frames to HTML. + + + A Web browser that can safely navigate frames to HTML but with several restrictions. + + + A Web browser that can navigate without restrictions. + + + Defines the identity permission for the zone from which the code originates. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class to represent the specified zone identity. + The zone identifier. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding to use to reconstruct the permission. + The parameter is . + The parameter is not a valid permission element. +-or- +The parameter's version number is not valid. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be of the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + The parameter is not and is not of the same type as the current permission. + + + Determines whether the current permission is a subset of the specified permission. + A permission that is to be tested for the subset relationship. This permission must be of the same type as the current permission. + + if the current permission is a subset of the specified permission; otherwise, . + The parameter is not , this permission does not represent the security zone, and the specified permission is not equal to the current permission. + + + Gets or sets the zone represented by the current . + One of the values. + The parameter value is not a valid value of . + + + Creates an XML encoding of the permission and its current state. + An XML encoding of the permission, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + A new permission that represents the union of the current permission and the specified permission. + The parameter is not and is not of the same type as the current permission. +-or- +The two permissions are not equal and the current permission does not represent the security zone. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates and returns a new . + A that corresponds to this attribute. + + + Gets or sets membership in the content zone specified by the property value. + One of the values. + + + Represents a membership condition that matches all code. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + Always . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Provides the application directory as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + The path of the application directory. + The parameter is . + + + Creates a new copy of the . + A new, identical copy of the . + + + Gets the path of the application directory. + The path of the application directory. + + + Determines whether instances of the same type of an evidence object are equivalent. + An object of same type as the current evidence object. + + if the two instances are equivalent; otherwise, . + + + Gets the hash code of the current application directory. + The hash code of the current application directory. + + + Gets a string representation of the state of the evidence object. + A representation of the state of the evidence object. + + + Determines whether an assembly belongs to a code group by testing its application directory. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Determines whether the membership condition is satisfied by the specified evidence. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified membership condition is an . + The object to compare to . + + if the specified membership condition is an ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid application directory membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Encapsulates security decisions about an application. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with an . + An that uniquely identifies an application. + + + Initializes a new instance of the class using the provided grant set and collection of full-trust assemblies. + A default permission set that is granted to all assemblies that do not have specific grants. + An array of strong names that represent assemblies that should be considered fully trusted in an application domain. + + is . + + contains an assembly that does not have a . + + + Gets or sets the application identity for the application trust object. + An for the application trust object. + + cannot be set because it has a value of . + + + Gets or sets the policy statement defining the default grant set. + A describing the default grants. + + + Gets or sets extra security information about the application. + An object containing additional security information about the application. + + + Reconstructs an object with a given state from an XML encoding. + The XML encoding to use to reconstruct the object. + + is . + The XML encoding used for is invalid. + + + Gets the list of full-trust assemblies for this application trust. + A list of full-trust assemblies. + + + Gets or sets a value indicating whether the application has the required permission grants and is trusted to run. + + if the application is trusted to run; otherwise, . The default is . + + + Gets or sets a value indicating whether application trust information is persisted. + + if application trust information is persisted; otherwise, . The default is . + + + Creates an XML encoding of the object and its current state. + An XML encoding of the security object, including any state information. + + + Represents a collection of objects. This class cannot be inherited. + + + Adds an element to the collection. + The object to add. + The index at which the new element was inserted. + + is . + The property of the specified in is . + + + Copies the elements of the specified array to the end of the collection. + An array of type containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Copies the elements of the specified to the end of the collection. + A containing the objects to add to the collection. + + is . + The property of an specified in is . + + + Removes all the application trusts from the collection. + The property of an item in the collection is . + + + Copies the entire collection to a compatible one-dimensional array, starting at the specified index of the target array. + The one-dimensional array of type that is the destination of the elements copied from the current collection. + The zero-based index in at which copying begins. + + is . + + is less than the lower bound of . + + is multidimensional. +-or- +The number of elements in the is greater than the available space from to the end of the destination . + + + Gets the number of items contained in the collection. + The number of items contained in the collection. + + + Gets the application trusts in the collection that match the specified application identity. + An object describing the application to find. + One of the values. + An containing all matching objects. + + + Returns an object that can be used to iterate over the collection. + An that can be used to iterate over the collection. + + + Gets a value indicating whether access to the collection is synchronized (thread safe). + + in all cases. + + + Gets the object located at the specified index in the collection. + The zero-based index of the object within the collection. + The object at the specified index in the collection. + + is greater than or equal to the count of objects in the collection. + + is negative. + + + Gets the object for the specified application. + The full name of the application. + The object for the specified application, or if the object cannot be found. + + + Removes all application trust objects that match the specified criteria from the collection. + The of the object to be removed. + One of the values. + + + Removes the specified application trust from the collection. + The object to remove. + + is . + The property of the object specified by is . + + + Removes the application trust objects in the specified array from the collection. + A one-dimensional array of type that contains items to be removed from the current collection. + + is . + + + Removes the application trust objects in the specified collection from the collection. + An that contains items to be removed from the current collection. + + is . + + + Gets an object that can be used to synchronize access to the collection. + The object to use to synchronize access to the collection. + + + Copies the elements of the to the specified , starting at the specified index. + The one-dimensional that is the destination of the elements copied from the . The must have zero-based indexing. + The zero-based index in at which copying begins. + + is . + + is less than zero. + + is multidimensional. +-or- +The number of elements in the source is greater than the available space from to the end of the destination . + + + Returns an enumerator that iterates through the collection. + An that can be used to iterate through the collection. + + + Represents the enumerator for objects in the collection. + + + Gets the current object in the collection. + The current in the . + + + Moves to the next element in the collection. + + if the enumerator was successfully advanced to the next element; if the enumerator has passed the end of the collection. + + + Resets the enumerator to the beginning of the collection. + + + Gets the current in the collection. + The current in the . + + + Specifies how to match versions when locating application trusts in a collection. + + + Match on all versions. + + + Match on the exact version. + + + Specifies the network resource access that is granted to code. + + + Initializes a new instance of the class. + The URI scheme represented by the current instance. + The port represented by the current instance. + + is . +-or- + is an empty string (""). +-or- + contains characters that are not permitted in schemes. +-or- + is less than 0. +-or- + is greater than 65,535. + + + Contains the string value that represents the scheme wildcard. + + + Returns a instance that represents access to the specified port using any scheme. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Returns a instance that represents access to the specified port using the code's scheme of origin. + The port represented by the returned instance. + A instance for the specified port. + + is less than 0. +-or- + is greater than 65,535. + + + Contains the value used to represent the default port. + + + Returns a value indicating whether two objects represent the same scheme and port. + The object to compare to the current object. + + if the two objects represent the same scheme and port; otherwise, . + + + Serves as a hash function for a particular type. + A hash code for the current . + + + Contains the value used to represent the port value in the URI where code originated. + + + Contains the value used to represent the scheme in the URL where the code originated. + + + Gets the port represented by the current instance. + A value that identifies a computer port used in conjunction with the property. + + + Gets the URI scheme represented by the current instance. + A that identifies a URI scheme, converted to lowercase. + + + Represents the abstract base class from which all implementations of code groups must derive. + + + Initializes a new instance of . + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Adds a child code group to the current code group. + The code group to be added as a child. This new child code group is added to the end of the list. + The parameter is . + The parameter is not a valid code group. + + + Gets a string representation of the attributes of the policy statement for the code group. + A string representation of the attributes of the policy statement for the code group. + + + Gets or sets an ordered list of the child code groups of a code group. + A list of child code groups. + An attempt is made to set this property to . + An attempt is made to set this property with a list of children that are not objects. + + + When overridden in a derived class, makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + When overridden in a derived class, serializes properties and internal state specific to a derived code group and adds the serialization to the specified . + The XML encoding to which to add the serialization. + The policy level within which the code group exists. + + + Gets or sets the description of the code group. + The description of the code group. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Determines whether the specified code group is equivalent to the current code group, checking the child code groups as well, if specified. + The code group to compare with the current code group. + + to compare child code groups, as well; otherwise, . + + if the specified code group is equivalent to the current code group; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + + + Reconstructs a security object with a given state and policy level from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + The parameter is . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets or sets the code group's membership condition. + The membership condition that determines to which evidence the code group is applicable. + An attempt is made to set this parameter to . + + + When overridden in a derived class, gets the merge logic for the code group. + A description of the merge logic for the code group. + + + Gets or sets the name of the code group. + The name of the code group. + + + When overridden in a derived class, reconstructs properties and internal state specific to a derived code group from the specified . + The XML encoding to use to reconstruct the security object. + The policy level within which the code group exists. + + + Gets the name of the named permission set for the code group. + The name of a named permission set of the policy level. + + + Gets or sets the policy statement associated with the code group. + The policy statement for the code group. + + + Removes the specified child code group. + The code group to be removed as a child. + The parameter is not an immediate child code group of the current code group. + + + When overridden in a derived class, resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + + + When overridden in a derived class, resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object, its current state, and the policy level within which the code exists. + The policy level within which the code group exists. + An XML encoding of the security object, including any state information. + + + Defines the set of information that constitutes input to security policy decisions. This class cannot be inherited. + + + Initializes a new empty instance of the class. + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Initializes a new instance of the class from a shallow copy of an existing one. + The instance from which to create the new instance. This instance is not deep-copied. + The parameter is not a valid instance of . + + + Initializes a new instance of the class from multiple sets of host and assembly evidence. + The host evidence from which to create the new instance. + The assembly evidence from which to create the new instance. + + + Adds the specified assembly evidence to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds an evidence object of the specified type to the assembly-supplied evidence list. + The assembly evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + is not serializable. + + + Adds the specified evidence supplied by the host to the evidence set. + Any evidence object. + + is null. + + is not serializable. + + + Adds host evidence of the specified type to the host evidence collection. + The host evidence to add. + The type of the object in . + + is . + Evidence of type is already in the list. + + + Removes the host and assembly evidence from the evidence set. + + + Returns a duplicate copy of this evidence object. + A duplicate copy of this evidence object. + + + Copies evidence objects to an . + The target array to which to copy evidence objects. + The zero-based position in the array to which to begin copying evidence objects. + + is null. + + is outside the range of the target array. + + + Gets the number of evidence objects in the evidence set. + The number of evidence objects in the evidence set. + + + Enumerates evidence provided by the assembly. + An enumerator for evidence added by the method. + + + Gets assembly evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the assembly evidence collection. + + + Enumerates all evidence in the set, both that provided by the host and that provided by the assembly. + An enumerator for evidence added by both the method and the method. + + + Enumerates evidence supplied by the host. + An enumerator for evidence added by the method. + + + Gets host evidence of the specified type from the collection. + The type of the evidence to get. + Evidence of type in the host evidence collection. + + + Gets a value indicating whether the evidence set is read-only. + Always , because read-only evidence sets are not supported. + + + Gets a value indicating whether the evidence set is thread-safe. + Always because thread-safe evidence sets are not supported. + + + Gets or sets a value indicating whether the evidence is locked. + + if the evidence is locked; otherwise, . The default is . + + + Merges the specified evidence set into the current evidence set. + The evidence set to be merged into the current evidence set. + The parameter is not a valid instance of . + + is , the code that calls this method does not have , and the parameter has a host list that is not empty. + + + Removes the evidence for a given type from the host and assembly enumerations. + The type of the evidence to be removed. + + is null. + + + Gets the synchronization root. + Always ( in Visual Basic), because synchronization of evidence sets is not supported. + + + Provides a base class from which all objects to be used as evidence must derive. + + + Initializes a new instance of the class. + An object to be used as evidence is not serializable. + + + Creates a new object that is a complete copy of the current instance. + A duplicate copy of this evidence object. + + + Grants permission to manipulate files located in the code assemblies to code assemblies that match the membership condition. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + One of the values. This value is used to construct the that is granted. + The parameter is . + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The code group to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the merge logic. + The string "Union". + + + Gets the name of the named permission set for the code group. + The concatenation of the string "Same directory FileIO - " and the access type. + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + The current policy is . +-or- +More than one code group (including the parent code group and all child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Allows security policy to be defined by the union of the policy statement of a code group and that of the first child code group that matches. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the code group. + An equivalent copy of the code group, including its membership conditions and child code groups. + + + Gets the merge logic. + The string "First Match". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + A that is the root of the tree of matching code groups. + The parameter is . + + + Confirms that a code assembly originates in the global assembly cache (GAC) as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Creates an equivalent copy of the current object. + An equivalent copy of . + + + Creates a new identity permission that corresponds to the current object. + The from which to construct the identity permission. + A new identity permission that corresponds to the current object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a object; otherwise, . + + + Returns a hash code for the current object. + A hash code for the current object. + + + Returns a string representation of the current object. + A string representation of the current object. + + + Determines whether an assembly belongs to a code group by testing its global assembly cache membership. This class cannot be inherited. + + + Initializes a new instance of the class. + + + Indicates whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new object. + + + Indicates whether the current object is equivalent to the specified object. + The object to compare with the current object. + + if is a ; otherwise, . + + + Uses the specified XML encoding to reconstruct a security object. + The that contains the XML encoding to use to reconstruct the security object. + + is . + + is not a valid membership condition element. + + + Uses the specified XML encoding to reconstruct a security object, using the specified policy level context. + The that contains the XML encoding to use to reconstruct the security object. + The context for resolving references. + + is . + + is not a valid membership condition element. + + + Gets a hash code for the current membership condition. + 0 (zero). + + + Returns a string representation of the membership condition. + A string representation of the membership condition. + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state, using the specified policy level context. + The context for resolving references. + A that contains the XML encoding of the security object, including any state information. + + + Provides evidence about the hash value for an assembly. This class cannot be inherited. + + + Initializes a new instance of the class. + The assembly for which to compute the hash value. + The parameter is . + + is not a run-time object. + + + Creates a object that contains an hash value. + A byte array that contains an hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + An object that contains the hash value provided by the parameter. + The parameter is . + + + Creates a object that contains a hash value. + A byte array that contains a hash value. + A hash object that contains the hash value provided by the parameter. + The parameter is . + + + Computes the hash value for the assembly using the specified hash algorithm. + The hash algorithm to use to compute the hash value for the assembly. + A byte array that represents the hash value for the assembly. + The parameter is . + The hash value for the assembly cannot be generated. + + + Gets the object with the parameter name and additional exception information. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Gets the hash value for the assembly. + A byte array that represents the hash value for the assembly. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its hash value. This class cannot be inherited. + + + Initializes a new instance of the class with the hash algorithm and hash value that determine membership. + The hash algorithm to use to compute the hash value for the assembly. + The hash value for which to test. + The parameter is . +-or- +The parameter is . + The parameter is not a valid hash algorithm. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the and the from the specified object are equivalent to the and contained in the current . + The object to compare to the current . + + if the and from the specified object is equivalent to the and contained in the current ; otherwise, . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + + + Gets or sets the hash algorithm to use for the membership condition. + The hash algorithm to use for the membership condition. + An attempt is made to set to . + + + Gets or sets the hash value for which the membership condition tests. + The hash value for which the membership condition tests. + An attempt is made to set to . + + + Runs when the entire object graph has been deserialized. + The object that initiated the callback. The functionality for this parameter is not currently implemented. + + + Populates a with the data needed to serialize the target object. + The to populate with data. + The destination for this serialization. + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + + + Defines the method that creates a new identity permission. + + + Creates a new identity permission for the specified evidence. + The evidence from which to create the new identity permission. + The new identity permission. + + + Defines the test to determine whether a code assembly is a member of a code group. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + + + Determines whether the specified is equal to the current . + The to compare with the current . + + if the specified is equal to the current ; otherwise, . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the current membership condition. + + + Grants Web permission to the site from which the assembly was downloaded. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies code access security policy. + The parameter is . + The type of the parameter is not valid. + + + Contains a value used to specify connection access for code with an unknown or unrecognized origin scheme. + + + Adds the specified connection access to the current code group. + A containing the scheme to match against the code's scheme. + A that specifies the scheme and port code can use to connect back to its origin server. + + is . + + contains characters that are not permitted in schemes. +-or- + = and specifies as its scheme. + + + Contains a value used to specify any other unspecified origin scheme. + + + Gets a string representation of the attributes of the policy statement for the code group. + Always . + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Determines whether the specified code group is equivalent to the current code group. + The object to compare with the current code group. + + if the specified code group is equivalent to the current code group; otherwise, . + + + Gets the connection access information for the current code group. + A array containing connection access information. + + + Gets the hash code of the current code group. + The hash code of the current code group. + + + Gets the logic to use for merging groups. + The string "Union". + + + Gets the name of the for the code group. + Always the string "Same site Web." + + + Removes all connection access information for the current code group. + + + Resolves policy for the code group and its descendants for a set of evidence. + The for the assembly. + A that consists of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Defines evidence that represents permission requests. This class cannot be inherited. + + + Initializes a new instance of the class with the permission request of a code assembly. + The minimum permissions the code requires to run. + The permissions the code can use if they are granted, but that are not required. + The permissions the code explicitly asks not to be granted. + + + Creates an equivalent copy of the current . + An equivalent copy of the current . + + + Gets the permissions the code explicitly asks not to be granted. + The permissions the code explicitly asks not to be granted. + + + Gets the permissions the code can use if they are granted, but are not required. + The permissions the code can use if they are granted, but are not required. + + + Gets the minimum permissions the code requires to run. + The minimum permissions the code requires to run. + + + Gets a string representation of the state of the . + A representation of the state of the . + + + The exception that is thrown when policy forbids code to run. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with serialized data. + The object that holds the serialized object data. + The contextual information about the source or destination. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Represents the security policy levels for the common language runtime. This class cannot be inherited. + + + Adds a corresponding to the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The used to create the to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds the specified to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The to add to the list of objects used to determine whether an assembly is a member of the group of assemblies that should not be evaluated. + The parameter is . + The specified by the parameter already has full trust. + + + Adds a to the current policy level. + The to add to the current policy level. + The parameter is . + The parameter has the same name as an existing in the . + + + Replaces a in the current policy level with the specified . + The name of the to replace. + The that replaces the specified by the parameter. + A copy of the that was replaced. + The parameter is . +-or- +The parameter is . + The parameter is equal to the name of a reserved permission set. +-or- +The specified by the parameter cannot be found. + + + Creates a new policy level for use at the application domain policy level. + The newly created . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The specified by the parameter is invalid. + + + Gets a list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. + A list of objects used to determine whether an assembly is a member of the group of assemblies used to evaluate security policy. These assemblies are granted full trust during security policy evaluation of assemblies not in the list. + + + Returns the in the current policy level with the specified name. + The name of the to find. + The in the current policy level with the specified name, if found; otherwise, . + The parameter is . + + + Gets a descriptive label for the policy level. + The label associated with the policy level. + + + Gets a list of named permission sets defined for the policy level. + A list of named permission sets defined for the policy level. + + + Replaces the configuration file for this with the last backup (reflecting the state of policy prior to the last time it was saved) and returns it to the state of the last save. + The policy level does not have a valid configuration file. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The assembly with the specified by the parameter does not have full trust. + + + Removes an assembly with the specified from the list of assemblies the policy level uses to evaluate policy. + The of the assembly to remove from the list of assemblies used to evaluate policy. + The parameter is . + The specified by the parameter does not have full trust. + + + Removes the specified from the current policy level. + The to remove from the current policy level. + The that was removed. + The specified by the parameter was not found. + The parameter is . + + + Removes the with the specified name from the current policy level. + The name of the to remove. + The that was removed. + The parameter is equal to the name of a reserved permission set. +-or- +A with the specified name cannot be found. + The parameter is . + + + Returns the current policy level to the default state. + + + Resolves policy based on evidence for the policy level, and returns the resulting . + The used to resolve the . + The resulting . + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Resolves policy at the policy level and returns the root of a code group tree that matches the evidence. + The used to resolve policy. + A representing the root of a tree of code groups matching the specified evidence. + The policy level contains multiple matching code groups marked as exclusive. + The parameter is . + + + Gets or sets the root code group for the policy level. + The that is the root of the tree of policy level code groups. + The value for is . + + + Gets the path where the policy file is stored. + The path where the policy file is stored, or if the does not have a storage location. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Gets the type of the policy level. + One of the values. + + + Represents the statement of a describing the permissions and other information that apply to code with a particular set of evidence. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + The with which to initialize the new instance. + + + Initializes a new instance of the class with the specified and attributes. + The with which to initialize the new instance. + A bitwise combination of the values. + + + Gets or sets the attributes of the policy statement. + The attributes of the policy statement. + + + Gets a string representation of the attributes of the policy statement. + A text string representing the attributes of the policy statement. + + + Creates an equivalent copy of the current policy statement. + A new copy of the with and identical to those of the current . + + + Determines whether the specified object is equal to the current . + The object to compare with the current . + + if the specified is equal to the current object; otherwise, . + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid encoding. + + + Reconstructs a security object with a given state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context for lookup of values. + The parameter is . + The parameter is not a valid encoding. + + + Gets a hash code for the object that is suitable for use in hashing algorithms and data structures such as a hash table. + A hash code for the current object. + + + Gets or sets the of the policy statement. + The of the policy statement. + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state. + The context for lookup of values. + An XML encoding of the security object, including any state information. + + + Defines special attribute flags for security policy on code groups. + + + All attribute flags are set. + + + The exclusive code group flag. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. At most, one code group matching a given piece of code can be set as exclusive. + + + The flag representing a policy statement that causes lower policy levels to not be evaluated as part of the resolve operation, effectively allowing the policy level to override lower levels. + + + No flags are set. + + + Provides the Authenticode X.509v3 digital signature of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate containing the publisher's public key. + An that contains the software publisher's public key. + The parameter is . + + + Gets the publisher's Authenticode X.509v3 certificate. + The publisher's . + + + Creates an equivalent copy of the . + A new, identical copy of the . + + + Creates an identity permission that corresponds to the current instance of the class. + The from which to construct the identity permission. + A for the specified . + + + Compares the current to the specified object for equivalence. + The to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current . + The hash code of the current . + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its software publisher's Authenticode X.509v3 certificate. This class cannot be inherited. + + + Initializes a new instance of the class with the Authenticode X.509v3 certificate that determines membership. + An that contains the software publisher's public key. + The parameter is . + + + Gets or sets the Authenticode X.509v3 certificate for which the membership condition tests. + The for which the membership condition tests. + The property value is . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current . + The object to compare to the current . + + if the publisher certificate from the specified object is equivalent to the publisher certificate contained in the current ; otherwise, . + The property is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the . + A representation of the . + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the Web site from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the website from which a code assembly originates. + The website of origin for the associated code assembly. + The parameter is . + + + Creates an equivalent copy of the object. + A new object that is identical to the current object. + + + Creates a new object from the specified URL. + The URL from which to create the new object. + A new site object. + The parameter is not a valid URL. +-or- +The parameter is a file name. + + + Creates an identity permission that corresponds to the current object. + The evidence from which to construct the identity permission. + A site identity permission for the current object. + + + Compares the current to the specified object for equivalence. + The object to test for equivalence with the current object. + + if the two instances of the class are equal; otherwise, . + + + Returns the hash code of the current website name. + The hash code of the current website name. + + + Gets the website from which the code assembly originates. + The name of the website from which the code assembly originates. + + + Returns a string representation of the current object. + A representation of the current site. + + + Determines whether an assembly belongs to a code group by testing the site from which it originated. This class cannot be inherited. + + + Initializes a new instance of the class with name of the site that determines membership. + The site name or wildcard expression. + The parameter is . + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the site from the specified object is equivalent to the site contained in the current . + The object to compare to the current . + + if the site from the specified object is equivalent to the site contained in the current ; otherwise, . + The property for the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Gets or sets the site for which the membership condition tests. + The site for which the membership condition tests. + An attempt is made to set to . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + + + Creates an XML encoding of the security object and its current state with the specified . + The context, used to resolve references. + An XML encoding of the security object, including any state information. + The property is . + + + Provides the strong name of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version. + The of the software publisher. + The simple name section of the strong name. + The of the strong name. + The parameter is . +-or- +The parameter is . +-or- +The parameter is . + The parameter is an empty string (""). + + + Creates an equivalent copy of the current . + A new, identical copy of the current . + + + Creates a that corresponds to the current . + The from which to construct the . + A for the specified . + + + Determines whether the specified strong name is equal to the current strong name. + The strong name to compare against the current strong name. + + if the specified strong name is equal to the current strong name; otherwise, . + + + Gets the hash code of the current . + The hash code of the current . + + + Gets the simple name of the current . + The simple name part of the . + + + Gets the of the current . + The of the current . + + + Creates a string representation of the current . + A representation of the current . + + + Gets the of the current . + The of the current . + + + Determines whether an assembly belongs to a code group by testing its strong name. This class cannot be inherited. + + + Initializes a new instance of the class with the strong name public key blob, name, and version number that determine membership. + The strong name public key blob of the software publisher. + The simple name section of the strong name. + The version number of the strong name. + The parameter is . + The parameter is . +-or- +The parameter is an empty string (""). + + + Determines whether the specified evidence satisfies the membership condition. + The against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + + + Creates an equivalent copy of the current . + A new, identical copy of the current + + + Determines whether the from the specified object is equivalent to the contained in the current . + The object to compare to the current . + + if the from the specified object is equivalent to the contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The context, used to resolve references. + The parameter is . + The parameter is not a valid membership condition element. + + + Returns the hash code for the current . + The hash code for the current . + The property is . + + + Gets or sets the simple name of the for which the membership condition tests. + The simple name of the for which the membership condition tests. + The value is . +-or- +The value is an empty string (""). + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + An attempt is made to set the to . + + + Creates and returns a string representation of the current . + A representation of the current . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The context, which is used to resolve references. + An XML encoding of the security object, including any state information. + + + Gets or sets the of the for which the membership condition tests. + The of the for which the membership condition tests. + + + Represents the context for the trust manager to consider when making the decision to run an application, and when setting up the security on a new in which to run an application. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class using the specified object. + One of the values that specifies the type of trust manager user interface to use. + + + Gets or sets a value indicating whether the application security manager should ignore any persisted decisions and call the trust manager. + + to call the trust manager; otherwise, . + + + Gets or sets a value indicating whether the trust manager should cache state for this application, to facilitate future requests to determine application trust. + + to cache state data; otherwise, . The default is . + + + Gets or sets a value indicating whether the trust manager should prompt the user for trust decisions. + + to not prompt the user; to prompt the user. The default is . + + + Gets or sets a value indicating whether the user's response to the consent dialog should be persisted. + + to cache state data; otherwise, . The default is . + + + Gets or sets the identity of the previous application identity. + An object representing the previous . + + + Gets or sets the type of user interface the trust manager should display. + One of the values. The default is . + + + Specifies the type of user interface (UI) the trust manager should use for trust decisions. + + + An Install UI. + + + A Run UI. + + + An Upgrade UI. + + + Represents a code group whose policy statement is the union of the current code group's policy statement and the policy statement of all its matching child code groups. This class cannot be inherited. + + + Initializes a new instance of the class. + A membership condition that tests evidence to determine whether this code group applies policy. + The policy statement for the code group in the form of a permission set and attributes to grant code that matches the membership condition. + The type of the parameter is not valid. +-or- +The type of the parameter is not valid. + + + Makes a deep copy of the current code group. + An equivalent copy of the current code group, including its membership conditions and child code groups. + + + Gets the merge logic. + Always the string "Union". + + + Resolves policy for the code group and its descendants for a set of evidence. + The evidence for the assembly. + A policy statement consisting of the permissions granted by the code group with optional attributes, or if the code group does not apply (the membership condition does not match the specified evidence). + The parameter is . + More than one code group (including the parent code group and any child code groups) is marked . + + + Resolves matching code groups. + The evidence for the assembly. + The complete set of code groups that were matched by the evidence. + The parameter is . + + + Provides the URL from which a code assembly originates as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the URL from which a code assembly originates. + The URL of origin for the associated code assembly. + The parameter is . + + + Creates a new copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates an identity permission corresponding to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + + + Gets the hash code of the current URL. + The hash code of the current URL. + + + Returns a string representation of the current . + A representation of the current . + + + Gets the URL from which the code assembly originates. + The URL from which the code assembly originates. + + + Determines whether an assembly belongs to a code group by testing its URL. This class cannot be inherited. + + + Initializes a new instance of the class with the URL that determines membership. + The URL for which to test. + The parameter is . + + must be an absolute URL. + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + + + Determines whether the URL from the specified object is equivalent to the URL contained in the current . + The object to compare to the current . + + if the URL from the specified object is equivalent to the URL contained in the current ; otherwise, . + The property of the current object or the specified object is . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context, used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + + + Gets or sets the URL for which the membership condition tests. + The URL for which the membership condition tests. + An attempt is made to set to . + Value is not an absolute URL. + + + Provides the security zone of a code assembly as evidence for policy evaluation. This class cannot be inherited. + + + Initializes a new instance of the class with the zone from which a code assembly originates. + The zone of origin for the associated code assembly. + The parameter is not a valid . + + + Creates an equivalent copy of the evidence object. + A new, identical copy of the evidence object. + + + Creates a new zone with the specified URL. + The URL from which to create the zone. + A new zone with the specified URL. + The parameter is . + + + Creates an identity permission that corresponds to the current instance of the evidence class. + The evidence set from which to construct the identity permission. + A for the specified evidence. + + + Compares the current evidence object to the specified object for equivalence. + The evidence object to test for equivalence with the current object. + + if the two objects are equal; otherwise, . + The parameter is not a object. + + + Gets the hash code of the current zone. + The hash code of the current zone. + + + Gets the zone from which the code assembly originates. + The zone from which the code assembly originates. + + + Returns a string representation of the current . + A representation of the current . + + + Determines whether an assembly belongs to a code group by testing its zone of origin. This class cannot be inherited. + + + Initializes a new instance of the class with the zone that determines membership. + The for which to test. + The parameter is not a valid . + + + Determines whether the specified evidence satisfies the membership condition. + The evidence set against which to make the test. + + if the specified evidence satisfies the membership condition; otherwise, . + The property is . + The property is not a valid . + + + Creates an equivalent copy of the membership condition. + A new, identical copy of the current membership condition. + The property is . + The property is not a valid . + + + Determines whether the zone from the specified object is equivalent to the zone contained in the current . + The object to compare to the current . + + if the zone from the specified object is equivalent to the zone contained in the current ; otherwise, . + The property for the current object or the specified object is . + The property for the current object or the specified object is not a valid . + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The parameter is . + The parameter is not a valid membership condition element. + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + The policy level context used to resolve named permission set references. + The parameter is . + The parameter is not a valid membership condition element. + + + Gets the hash code for the current membership condition. + The hash code for the current membership condition. + The property is . + The property is not a valid . + + + Gets or sets the zone for which the membership condition tests. + The zone for which the membership condition tests. + The value is . + An attempt is made to set to an invalid . + + + Creates and returns a string representation of the membership condition. + A string representation of the state of the membership condition. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Creates an XML encoding of the security object and its current state with the specified . + The policy level context for resolving named permission set references. + An XML encoding of the security object, including any state information. + The property is . + The property is not a valid . + + + Specifies the type of a managed code policy level. + + + Security policy for all managed code in an application. + + + Security policy for all managed code in an enterprise. + + + Security policy for all managed code that is run on the computer. + + + Security policy for all managed code that is run by the user. + + + Encapsulates and propagates all security-related data for execution contexts transferred across threads. This class cannot be inherited. + + + Captures the security context for the current thread. + The security context for the current thread. + + + Creates a copy of the current security context. + The security context for the current thread. + The current security context has been previously used, was marshaled across application domains, or was not acquired through the method. + + + Releases all resources used by the current instance of the class. + + + Determines whether the flow of the security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Determines whether the flow of the Windows identity portion of the current security context has been suppressed. + + if the flow has been suppressed; otherwise, . + + + Restores the flow of the security context across asynchronous threads. + The security context is or an empty string. + + + Runs the specified method in the specified security context on the current thread. + The security context to set. + The delegate that represents the method to run in the specified security context. + The object to pass to the callback method. + + is . +-or- + was not acquired through a capture operation. +-or- + has already been used as the argument to a method call. + + + Suppresses the flow of the security context across asynchronous threads. + An structure for restoring the flow. + + + Suppresses the flow of the Windows identity portion of the current security context across asynchronous threads. + A structure for restoring the flow. + + + Identifies the source for the security context. + + + The current application domain is the source for the security context. + + + The current assembly is the source for the security context. + + + Provides the main access point for classes interacting with the security system. This class cannot be inherited. + + + Gets or sets a value indicating whether code must have in order to execute. + + if code must have in order to execute; otherwise, . + The code that calls this method does not have . + + + Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time. + + if the stack contains no partially trusted application domains, no partially trusted assemblies, and no currently active or modifiers; if the common language runtime cannot guarantee that the stack contains none of these. + + + Gets a permission set that is safe to grant to an application that has the provided evidence. + The host evidence to match to a permission set. + A permission set that can be used as a grant set for the application that has the provided evidence. + + is . + + + Gets the granted zone identity and URL identity permission sets for the current assembly. + An output parameter that contains an of granted objects. + An output parameter that contains an of granted objects. + The request for failed. + + + Determines whether a permission is granted to the caller. + The permission to test against the grant of the caller. + + if the permissions granted to the caller include the permission ; otherwise, . + + + Loads a from the specified file. + The physical file path to a file containing the security policy information. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The file indicated by the parameter does not exist. + The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . +-or- +The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Loads a from the specified string. + The XML representation of a security policy level in the same form in which it appears in a configuration file. + One of the enumeration values that specifies the type of the policy level to be loaded. + The loaded policy level. + The parameter is . + The parameter is not valid. + The code that calls this method does not have . + + + Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy. + An enumerator for objects that compose the security policy hierarchy. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Determines what permissions to grant to code based on the specified evidence. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines what permissions to grant to code based on the specified evidence and requests. + The evidence set used to evaluate policy. + The required permissions the code needs to run. + The optional permissions that will be used if granted, but aren't required for the code to run. + The denied permissions that must never be granted to the code even if policy otherwise permits it. + An output parameter that contains the set of permissions not granted. + The set of permissions that would be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + Policy fails to grant the minimum required permissions specified by the parameter. + + + Determines what permissions to grant to code based on the specified evidence. + An array of evidence objects used to evaluate policy. + The set of permissions that is appropriate for all of the provided evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets a collection of code groups matching the specified evidence. + The evidence set against which the policy is evaluated. + An enumeration of the set of code groups matching the evidence. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Determines which permissions to grant to code based on the specified evidence, excluding the policy for the level. + The evidence set used to evaluate policy. + The set of permissions that can be granted by the security system. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Saves the modified security policy state. + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + The code that calls this method does not have . + + + Saves a modified security policy level loaded with . + The policy level object to be saved. + The code that calls this method does not have . + This method uses code access security (CAS) policy, which is obsolete in the .NET Framework 4. To enable CAS policy for compatibility with earlier versions of the .NET Framework, use the <legacyCasPolicy> element. + + + Gets or sets a value indicating whether security is enabled. + + if security is enabled; otherwise, . + The code that calls this method does not have . + + + Provides a base class for requesting the security status of an action from the object. + + + Initializes a new instance of the class. + + + When overridden in a derived class, ensures that the state that is represented by is available on the host. + + + Gets a value that indicates whether the state for this implementation of the class is available on the current host. + + if the state is available; otherwise, . + + + Defines the integer values corresponding to security zones used by security policy. + + + The Internet zone is used for the Web sites on the Internet that do not belong to another zone. + + + The local intranet zone is used for content located on a company's intranet. Because the servers and information would be within a company's firewall, a user or company could assign a higher trust level to the content on the intranet. + + + The local computer zone is an implicit zone used for content that exists on the user's computer. + + + No zone is specified. + + + The trusted sites zone is used for content located on Web sites considered more reputable or trustworthy than other sites on the Internet. Users can use this zone to assign a higher trust level to these sites to minimize the number of authentication requests. The URLs of these trusted Web sites need to be mapped into this zone by the user. + + + The restricted sites zone is used for Web sites with content that could cause, or could have caused, problems when downloaded. The URLs of these untrusted Web sites need to be mapped into this zone by the user. + + + The exception that is thrown when there is a syntax error in XML parsing. This class cannot be inherited. + + + Initializes a new instance of the class with default properties. + + + Initializes a new instance of the class with the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + + + Initializes a new instance of the class with a specified error message and the line number where the exception was detected. + The line number of the XML stream where the XML syntax error was detected. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class with a specified error message and a reference to the inner exception that is the cause of this exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If the parameter is not , the current exception is raised in a block that handles the inner exception. + + + Allows control of code access security permissions for service controllers. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified access to resources. + One of the values. + The parameter is not a valid value of . + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer on which the service resides, and the short name that identifies the service to the system. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + + Initializes a new instance of the class with the specified permission entries. + An array of objects. The property is set to this value. + + is . + + + Gets the collection of permission entries for this permissions request. + A that contains the permission entries for this permissions request. + + + Defines access levels used by permission classes. + + + The can connect to, but not control, existing services. + + + The can connect to and control existing services. + + + The has no permissions. + + + Allows declarative service controller permission checks. + + + Initializes a new instance of the class. + One of the values. + + + Creates the permission based on the requested access levels that are set through the property on the attribute. + An that represents the created permission. + + + Gets or sets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + The syntax is invalid. + + + Gets or sets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets or sets the short name that identifies the service to the system. + The name of the service. + The is . + The syntax of the property is invalid. + + + Defines the smallest unit of a code access security permission that is set for a . + + + Initializes a new instance of the class. + + + Initializes a new instance of the class with the specified permission access levels, the name of the computer, and a short name that identifies the service. + One of the values. + The name of the computer on which the service resides. + The short name that identifies the service to the system. + + is . + + is not valid. +-or- + is not valid. + + + Gets the name of the computer on which the service resides. + The name of the computer that is running the service associated with the . + + + Gets the access levels used in the permissions request. + A bitwise combination of the values. + + + Gets the short name that identifies the service to the system. + The name of the service. + + + Contains a strongly-typed collection of objects. + + + Adds a specified to this collection. + The object to add. + The zero-based index of the added object. + + + Appends a set of specified permission entries to this collection. + An array of type objects that contains the permission entries to add. + + is . + + + Appends a set of specified permission entries to this collection. + A that contains the permission entries to add. + + is . + + + Determines whether this collection contains a specified object. + The object to find. + + if the specified object belongs to this collection; otherwise, . + + + Copies the permission entries from this collection to an array, starting at a particular index of the array. + An array of type that receives the copied permission entries. + The zero-based index at which to begin copying the permission entries. + + + Determines the index of a specified permission entry in this collection. + The permission entry to search for. + The zero-based index of the specified permission entry, or -1 if the permission entry was not found in the collection. + + + Inserts a permission entry into this collection at a specified index. + The zero-based index of the collection at which to insert the permission entry. + The permission entry to insert into this collection. + + + Gets or sets the object at a specified index. + The zero-based index into the collection. + The object that exists at the specified index. + + + Performs additional custom processes after clearing the contents of the collection. + + + Performs additional custom processes before a new permission entry is inserted into the collection. + The zero-based index at which to insert . + The new value of the permission entry at . + + + Performs additional custom processes when removing a new permission entry from the collection. + The zero-based index at which can be found. + The permission entry to remove from . + + + Performs additional custom processes before setting a value in the collection. + The zero-based index at which can be found. + The value to replace with . + The new value of the permission entry at . + + + Removes a specified permission entry from this collection. + The permission entry to remove. + + + The permission that is demanded by when management of a transaction is escalated to MSDTC. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the values. + + + Creates and returns an identical copy of the current permission. + A copy of the current permission. + + + Reconstructs a permission with a specified state from an XML encoding. + The XML encoding used to reconstruct the permission. + + + Creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to intersect with the current permission. It must be the same type as the current permission. + A new permission that represents the intersection of the current permission and the specified permission. This new permission is if the intersection is empty. + + + Returns a value that indicates whether the current permission is a subset of the specified permission. + A permission to test for the subset relationship. This permission must be the same type as the current permission. + + if the current is a subset of the specified ; otherwise, . + + + Returns a value that indicates whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Creates an XML encoding of the security object and its current state. + A that contains the XML encoding of the security object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class with the specified . + One of the values. + + + Creates a permission object that can then be serialized into binary form and persistently stored along with the in an assembly's metadata. + A serializable permission object. + + + Gets or sets a value indicating whether full (unrestricted) permission to the resource protected by the attribute is declared. + + if full permission to the protected resource is declared; otherwise, . + + + Controls access permissions in ASP.NET hosted environments. This class cannot be inherited. + + + Initializes a new instance of the class with the specified enumeration value. + A enumeration value. + + is not set to one of the enumeration values. + + + Initializes a new instance of the class with the specified permission level. + An enumeration value. + + + When implemented by a derived class, creates and returns an identical copy of the current permission object. + A copy of the current permission object. + + + Reconstructs a permission object with a specified state from an XML encoding. + The containing the XML encoding to use to reconstruct the permission object. + + is . + The property of is not equal to "IPermission". +-or- +The class of is or an empty string (""). + + + When implemented by a derived class, creates and returns a permission that is the intersection of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the intersection of the current permission and the specified permission; otherwise, if the intersection is empty. + + is not an . + + + Returns a value indicating whether the current permission is a subset of the specified permission. + The to combine with the current permission. It must be of the same type as the current . + + if the current is a subset of the specified ; otherwise, . + + is not an . + + + Returns a value indicating whether unrestricted access to the resource that is protected by the current permission is allowed. + + if unrestricted use of the resource protected by the permission is allowed; otherwise, . + + + Gets or sets the current hosting permission level for an ASP.NET application. + One of the enumeration values. + + + Creates an XML encoding of the permission object and its current state. + A containing the XML encoding of the permission object, including any state information. + + + Creates a permission that is the union of the current permission and the specified permission. + A permission to combine with the current permission. It must be of the same type as the current permission. + An that represents the union of the current permission and the specified permission. + + is not an . + + + Allows security actions for to be applied to code using declarative security. This class cannot be inherited. + + + Initializes a new instance of the class. + One of the enumeration values. + + + Creates a new with the permission level previously set by the property. + An that is the new . + + + Gets or sets the current hosting permission level. + One of the enumeration values. + + + Specifies the trust level that is granted to an ASP.NET Web application. + + + Indicates that features protected with a demand for any level less than or equal to the trust level will succeed. This level is intended for highly trusted managed-code applications that need to use most of the managed permissions that support semi-trusted access. It does not grant some of the highest permissions (for example, the ability to call into native code), but it does provide a way to run trusted applications with least privilege or to provide some level of constraints for highly trusted applications. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is intended to allow read-only access to limited resources in a constrained environment. This level is granted by specifying the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for any level less than or equal to the level will succeed. This level is granted by configuring at least the trust level in the trust section in a configuration file. + + + Indicates that features protected with a demand for the level will succeed. This level allows code to execute but not to interact with resources present on the system. This level is granted by configuring at least the trust level using the trust section in a configuration file. + + + Indicates that no permission is granted. All demands for will fail. + + + Indicates that all demands for permission to use all features of an application will be granted. This is equivalent to granting trust level in the trust section in a configuration file. + + + Defines access control to assemblies and types for purposes of XAML loading. + + + Returns a instance based on an assembly requested by . + The assembly for the request. + A instance, with the value used as source information for . + + is . + + + Returns a instance based on an assembly requested by . + The assembly name for the request. + A instance, with the value used as source information for . + + is . + + is not a valid fully qualified assembly name. + + + Gets the of the assembly for which this determines permissions. + The of the assembly for which this determines permissions. + + + Returns a instance based on a specific type specified by its qualified name. + A string that is parsed as an assembly-qualified type name. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + is not a valid assembly-qualified type name. +-or- +Assembly name within is not a valid assembly name. + + + Returns a instance based on a specific type specified by . + The to request access for. + A instance, with the value used as source information for and determined by reflection on the type. + + is . + + + Gets the unqualified string name of the type for which this determines permissions. + The unqualified string name of the type for which this determines permissions. + + + Declares permissions for loading types from assemblies that are used by a XAML reader or writer. + + + Initializes a new instance of the class, using an enumerable set of specific values. + An enumerable set of specific values. + + is . + + contained invalid information, such as a null item. + + + Initializes a new instance of the class, using existing permissions. + A enumeration value. + + + Initializes a new instance of the class, using a single value. + The defining value. + + is . + + + Gets the list of all values that this represents. + A read-only list of values, or . + + + Creates and returns an identical copy of the current . + A copy of the current . + + + + + + Reconstructs a security object with a specified state from an XML encoding. + The XML encoding to use to reconstruct the security object. + + is . + + does not contain the XML encoding for a . +-or- +The version attribute within is not supported. + + + + Returns whether this includes a specified in its list. + The specific to check for. + + if exists as an item in the list of the current . Otherwise, . + + is null. + + + Creates and returns a that is the intersection of the current and the specified permission. + A to intersect with the current . Can be . + A new permission that represents the intersection of the current and the specified . This new permission is if the intersection is empty. + + is not or is not a . + + + Determines whether the current is a subset of the specified permission. + A permission that is to be tested for the subset relationship. Can be . + + if the current is a subset of the specified permission; otherwise, . + + is not or is not a . + + + Returns whether this denotes unrestricted permissions. + + if this denotes unrestricted permissions. if this has specific access level restrictions in , or has no permissions. + + + Creates an XML encoding of this and its current state. + An XML encoding of this , including any state information. + + + Creates a permission that is the union of the current and the specified permission. + A to combine with the current . Can be . + A new that represents the union of the current and the specified . + + is not or is not a . + + + \ No newline at end of file diff --git a/packages/System.Security.Permissions.4.7.0/useSharedDesignerContext.txt b/packages/System.Security.Permissions.4.7.0/useSharedDesignerContext.txt new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Permissions.4.7.0/version.txt b/packages/System.Security.Permissions.4.7.0/version.txt new file mode 100644 index 0000000..f5d54e7 --- /dev/null +++ b/packages/System.Security.Permissions.4.7.0/version.txt @@ -0,0 +1 @@ +0f7f38c4fd323b26da10cce95f857f77f0f09b48 diff --git a/packages/System.Security.Principal.Windows.4.7.0/.signature.p7s b/packages/System.Security.Principal.Windows.4.7.0/.signature.p7s new file mode 100644 index 0000000..aed0689 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/.signature.p7s differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/LICENSE.TXT b/packages/System.Security.Principal.Windows.4.7.0/LICENSE.TXT new file mode 100644 index 0000000..984713a --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/LICENSE.TXT @@ -0,0 +1,23 @@ +The MIT License (MIT) + +Copyright (c) .NET Foundation and Contributors + +All rights reserved. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/packages/System.Security.Principal.Windows.4.7.0/System.Security.Principal.Windows.4.7.0.nupkg b/packages/System.Security.Principal.Windows.4.7.0/System.Security.Principal.Windows.4.7.0.nupkg new file mode 100644 index 0000000..e0e0cdc Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/System.Security.Principal.Windows.4.7.0.nupkg differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Security.Principal.Windows.4.7.0/THIRD-PARTY-NOTICES.TXT new file mode 100644 index 0000000..77a243e --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/THIRD-PARTY-NOTICES.TXT @@ -0,0 +1,375 @@ +.NET Core uses third-party libraries or other resources that may be +distributed under licenses different than the .NET Core software. + +In the event that we accidentally failed to list a required notice, please +bring it to our attention. Post an issue or email us: + + dotnet@microsoft.com + +The attached notices are provided for information only. + +License notice for ASP.NET +------------------------------- + +Copyright (c) .NET Foundation. All rights reserved. +Licensed under the Apache License, Version 2.0. + +Available at +https://github.com/aspnet/AspNetCore/blob/master/LICENSE.txt + +License notice for Slicing-by-8 +------------------------------- + +http://sourceforge.net/projects/slicing-by-8/ + +Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + + +This software program is licensed subject to the BSD License, available at +http://www.opensource.org/licenses/bsd-license.html. + + +License notice for Unicode data +------------------------------- + +http://www.unicode.org/copyright.html#License + +Copyright © 1991-2017 Unicode, Inc. All rights reserved. +Distributed under the Terms of Use in http://www.unicode.org/copyright.html. + +Permission is hereby granted, free of charge, to any person obtaining +a copy of the Unicode data files and any associated documentation +(the "Data Files") or Unicode software and any associated documentation +(the "Software") to deal in the Data Files or Software +without restriction, including without limitation the rights to use, +copy, modify, merge, publish, distribute, and/or sell copies of +the Data Files or Software, and to permit persons to whom the Data Files +or Software are furnished to do so, provided that either +(a) this copyright and permission notice appear with all copies +of the Data Files or Software, or +(b) this copyright and permission notice appear in associated +Documentation. + +THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF +ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE +WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT OF THIRD PARTY RIGHTS. +IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS +NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL +DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, +DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER +TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THE DATA FILES OR SOFTWARE. + +Except as contained in this notice, the name of a copyright holder +shall not be used in advertising or otherwise to promote the sale, +use or other dealings in these Data Files or Software without prior +written authorization of the copyright holder. + +License notice for Zlib +----------------------- + +https://github.com/madler/zlib +http://zlib.net/zlib_license.html + +/* zlib.h -- interface of the 'zlib' general purpose compression library + version 1.2.11, January 15th, 2017 + + Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler + + This software is provided 'as-is', without any express or implied + warranty. In no event will the authors be held liable for any damages + arising from the use of this software. + + Permission is granted to anyone to use this software for any purpose, + including commercial applications, and to alter it and redistribute it + freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. + 2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. + 3. This notice may not be removed or altered from any source distribution. + + Jean-loup Gailly Mark Adler + jloup@gzip.org madler@alumni.caltech.edu + +*/ + +License notice for Mono +------------------------------- + +http://www.mono-project.com/docs/about-mono/ + +Copyright (c) .NET Foundation Contributors + +MIT License + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the Software), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, +EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND +NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE +LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION +OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION +WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for International Organization for Standardization +----------------------------------------------------------------- + +Portions (C) International Organization for Standardization 1986: + Permission to copy in any form is granted for use with + conforming SGML systems and applications as defined in + ISO 8879, provided this notice is included in all copies. + +License notice for Intel +------------------------ + +"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this +list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, +this list of conditions and the following disclaimer in the documentation +and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +License notice for Xamarin and Novell +------------------------------------- + +Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Copyright (c) 2011 Novell, Inc (http://www.novell.com) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +Third party notice for W3C +-------------------------- + +"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE +Status: This license takes effect 13 May, 2015. +This work is being provided by the copyright holders under the following license. +License +By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. +Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: +The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. +Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. +Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." +Disclaimers +THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. +COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. +The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." + +License notice for Bit Twiddling Hacks +-------------------------------------- + +Bit Twiddling Hacks + +By Sean Eron Anderson +seander@cs.stanford.edu + +Individually, the code snippets here are in the public domain (unless otherwise +noted) — feel free to use them however you please. The aggregate collection and +descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are +distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and +without even the implied warranty of merchantability or fitness for a particular +purpose. + +License notice for Brotli +-------------------------------------- + +Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN +THE SOFTWARE. + +compress_fragment.c: +Copyright (c) 2011, Google Inc. +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +decode_fuzzer.c: +Copyright (c) 2015 The Chromium Authors. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + + * Redistributions of source code must retain the above copyright +notice, this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above +copyright notice, this list of conditions and the following disclaimer +in the documentation and/or other materials provided with the +distribution. + * Neither the name of Google Inc. nor the names of its +contributors may be used to endorse or promote products derived from +this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." + +License notice for Json.NET +------------------------------- + +https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md + +The MIT License (MIT) + +Copyright (c) 2007 James Newton-King + +Permission is hereby granted, free of charge, to any person obtaining a copy of +this software and associated documentation files (the "Software"), to deal in +the Software without restriction, including without limitation the rights to +use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of +the Software, and to permit persons to whom the Software is furnished to do so, +subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS +FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR +COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER +IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN +CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +License notice for vectorized base64 encoding / decoding +-------------------------------------------------------- + +Copyright (c) 2005-2007, Nick Galbreath +Copyright (c) 2013-2017, Alfred Klomp +Copyright (c) 2015-2017, Wojciech Mula +Copyright (c) 2016-2017, Matthieu Darbois +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are +met: + +- Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + +- Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED +TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/net46/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/lib/net46/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..06601a1 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/lib/net46/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..2027a85 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/lib/net461/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard1.3/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard1.3/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..8512b2b Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard1.3/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..19d0fc0 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/lib/netstandard2.0/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/lib/uap10.0.16299/_._ b/packages/System.Security.Principal.Windows.4.7.0/lib/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/net46/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/ref/net46/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..06601a1 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/ref/net46/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..0a4eaa0 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/net461/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..f8373f5 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netcoreapp3.0/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..bc74a88 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..fafdac4 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/System.Security.Principal.Windows.xml @@ -0,0 +1,733 @@ + + + + System.Security.Principal.Windows + + + + [SECURITY CRITICAL] Provides a safe handle to a Windows thread or process access token. For more information see Access Tokens + + + [SECURITY CRITICAL] Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + [SECURITY CRITICAL] Returns an invalid handle by instantiating a object with . + Returns a object. + + + [SECURITY CRITICAL] Gets a value that indicates whether the handle is invalid. + true if the handle is not valid; otherwise, false. + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a catch block that handles the inner exception. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + true if is an object with the same underlying type and value as this instance; otherwise, false. + An object to compare with this instance, or a null reference. + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + true if is a valid translation type for the class; otherwise, false. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both null. + true if and are equal; otherwise, false. + The left operand to use for the equality comparison. This parameter can be null. + The right operand to use for the equality comparison. This parameter can be null. + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is null and the other is not. + true if and are not equal; otherwise, false. + The left operand to use for the inequality comparison. This parameter can be null. + The right operand to use for the inequality comparison. This parameter can be null. + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The converted identity. + The target type for the conversion from . + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + true if the collection contains the specified object. + The object to check for. + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is null. + The zero-based index in the collection. + + + Removes the specified object from the collection. + true if the specified object was removed from the collection. + The object to remove. + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to false, which means that exceptions will not be thrown for items that fail conversion. + A collection that represents the converted contents of the original collection. + The type to which items in the collection are being converted. + + + + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + A collection that represents the converted contents of the original collection. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled.If is true, conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown.If is false, types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + + + + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be null or an empty string. + + is null. + + is an empty string.-or- is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be null or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be null or an empty string. + + is null. + + is an empty string.-or- is too long.-or- is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + true if is an object with the same underlying type and value as this object; otherwise, false. + An object to compare with this object, or null. + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + true if is a valid translation type for the class; otherwise false. + The type being queried for validity to serve as a conversion from . The following target types are valid:- - + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both null. + true if and are equal; otherwise false. + The left operand to use for the equality comparison. This parameter can be null. + The right operand to use for the equality comparison. This parameter can be null. + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is null and the other is not. + true if and are not equal; otherwise false. + The left operand to use for the inequality comparison. This parameter can be null. + The right operand to use for the inequality comparison. This parameter can be null. + + + Returns the account name, in Domain\Account format, for the account represented by the object. + The account name, in Domain\Account format. + + + Translates the account name represented by the object into another -derived type. + The converted identity. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + + is null. + + is not an type. + Some or all identity references could not be translated. + The source account name is too long.-or-A Win32 error code was returned. + + + + + + Returns an uppercase string representation of this object. + The uppercase string representation of this object. + + + + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values.- - - - - - - - - - - - - + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + A signed number indicating the relative values of this instance and .Return Value Description Less than zero This instance is less than . Zero This instance is equal to . Greater than zero This instance is greater than . + The object to compare with the current object. + + + Returns a value that indicates whether this object is equal to a specified object. + true if is an object with the same underlying type and value as this object; otherwise, false. + An object to compare with this object, or null. + + + Indicates whether the specified object is equal to the current object. + true if the value of is equal to the value of the current object. + The object to compare with the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + true if the SID represented by this object is a valid Windows account SID; otherwise, false. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + true if the SID represented by this object is in the same domain as the SID; otherwise, false. + The SID to compare with this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + true if is a valid translation type for the class; otherwise, false. + The type being queried for validity to serve as a conversion from . The following target types are valid:- - + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + true if is the SID type for the object; otherwise, false. + A value to compare with the object. + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both null. + true if and are equal; otherwise, false. + The left operand to use for the equality comparison. This parameter can be null. + The right operand to use for the equality comparison. This parameter can be null. + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is null and the other is not. + true if and are not equal; otherwise, false. + The left operand to use for the inequality comparison. This parameter can be null. + The right operand to use for the inequality comparison. This parameter can be null. + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The converted identity. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + + is null. + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches everyone. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. For more information, see Remarks. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [SECURITY CRITICAL] Gets this for this instance. + Returns a . + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + true to release both managed and unmanaged resources; false to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + An object that represents a Windows user. + true to return the only if the thread is currently impersonating; false to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + + + + + + Returns a object that represents the current Windows user, using the specified desired token access level. + An object that represents the current user. + A bitwise combination of the enumeration values. + + + + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + true if the user account is an anonymous account; otherwise, false. + + + Gets a value indicating whether the user account is identified as a account by the system. + true if the user account is a account; otherwise, false. + + + Gets a value indicating whether the user account is identified as a account by the system. + true if the user account is a account; otherwise, false. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + Returns the result of the function. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is null. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + true if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, false. + The RID of the Windows user group in which to check for the principal’s membership status. + + + + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + true if the current principal is a member of the specified Windows user group; otherwise, false. + A that uniquely identifies a Windows user group. + + is null. + Windows returned a Win32 error. + + + + + + Determines whether the current principal belongs to the Windows user group with the specified . + true if the current principal is a member of the specified Windows user group; otherwise, false. + One of the values. + + is not a valid value. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/de/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/de/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..7666cce --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/de/System.Security.Principal.Windows.xml @@ -0,0 +1,733 @@ + + + + System.Security.Principal.Windows + + + + [SICHERHEITSRELEVANT] Stellt ein sicheres Handle zu einem Windows-Thread oder Prozesszugriffstoken bereit.Weitere Informationen finden Sie unter Zugriffstoken. + + + [SICHERHEITSRELEVANT] Initialisiert eine neue Instanz der -Klasse. + Ein -Objekt, das das zu verwendende, bereits vorhandene Handle darstellt.Bei Verwendung von wird ein ungültiges Handle zurückgegeben. + + + [SICHERHEITSRELEVANT] Gibt ein ungültiges Handle zurück, indem ein -Objekt mit instanziiert wird. + Gibt ein -Objekt zurück. + + + [SICHERHEITSRELEVANT] Ruft einen Wert ab, der angibt, ob das Handle ungültig ist. + true, wenn das Handle ungültig ist, andernfalls false. + + + Stellt eine Ausnahme für einen Principal dar, dessen Identität keiner bekannten Identität zugeordnet werden konnte. + + + Initialisiert eine neue Instanz der -Klasse. + + + Initialisiert eine neue Instanz der -Klasse, indem die angegebene Fehlermeldung verwendet wird. + Die Fehlermeldung, in der die Ursache der Ausnahme erklärt wird. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Fehlermeldung und der angegebenen internen Ausnahme. + Die Fehlermeldung, in der die Ursache der Ausnahme erklärt wird. + Die Ausnahme, die die Ursache der aktuellen Ausnahme ist.Wenn nicht NULL ist, wird die aktuelle Ausnahme in einem catch-Block ausgelöst, der die innere Ausnahme behandelt. + + + Stellt die Auflistung nicht zugeordneter Identitäten für eine -Ausnahme dar. + Die Auflistung nicht zugeordneter Identitäten. + + + Stellt eine Identität dar und ist die Basisklasse für die -Klasse und die -Klasse.Diese Klasse stellt keinen öffentlichen Konstruktor bereit und kann deshalb nicht geerbt werden. + + + Gibt einen Wert zurück, der angibt, ob das angegebene Objekt gleich dieser Instanz der -Klasse ist. + true, wenn ein Objekt mit demselben zugrunde liegenden Typ und Wert wie diese -Instanz ist, andernfalls false. + Ein Objekt, das mit dieser -Instanz verglichen werden soll, oder ein NULL-Verweis. + + + Fungiert als eine Hashfunktion für . ist für die Verwendung in Hashalgorithmen und Datenstrukturen, z. B. in einer Hashtabelle, geeignet. + Der Hashcode für dieses -Objekt. + + + Gibt einen Wert zurück, der angibt, ob der angegebene Typ ein gültiger Verschiebungstyp für die -Klasse ist. + true, wenn ein gültiger Verschiebungstyp für die -Klasse ist, andernfalls false. + Der Typ, dessen Gültigkeit abgefragt wird, und der als eine Konvertierung von fungieren soll.Die folgenden Zieltypen sind gültig: + + + Vergleicht zwei -Objekte auf Gleichheit.Diese werden als gleich betrachtet, wenn Sie dieselbe kanonische Namensdarstellung besitzen, wie die von der -Eigenschaft zurückgegebene Darstellung, oder wenn beide null sind. + true, wenn und gleich sind, andernfalls false. + Der linke -Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte -Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Vergleicht zwei -Objekte auf Ungleichheit.Diese werden als ungleich betrachtet, wenn Sie andere kanonische Namensdarstellungen besitzen, als die von der -Eigenschaft zurückgegebene Darstellung, oder wenn eines der Objekte null ist und das andere nicht. + true, wenn und ungleich sind, andernfalls false. + Der linke -Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte -Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Ruft die Zeichenfolgendarstellung der durch das -Objekt dargestellten Identität ab. + Die Identität im Zeichenfolgenformat. + + + Übersetzt den Kontonamen, der durch das -Objekt dargestellt wird, in einen anderen von abgeleiteten Typ. + Die konvertierte Identität. + Der Zieltyp für die Konvertierung von . + + + Ruft den Zeichenfolgenwert der durch das -Objekt dargestellten Identität ab. + Der Zeichenfolgenwert der durch das -Objekt dargestellten Identität. + + + Stellt eine Auflistung von -Objekten dar und stellt ein Verfahren bereit, mit dem Gruppen von aus abgeleiteten Objekten in von abgeleitete Typen konvertiert werden können. + + + Initialisiert eine neue Instanz der -Klasse mit 0 (null) Elementen in der Auflistung. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Anfangsgröße. + Die anfängliche Anzahl der Elemente in der Auflistung.Der Wert von ist nur ein Hinweis; er bezeichnet nicht unbedingt die maximale Anzahl der erstellten Elemente. + + + Fügt der -Auflistung ein -Objekt hinzu. + Das -Objekt, das zur Auflistung hinzugefügt werden soll. + + + Löscht alle -Objekte aus der -Auflistung. + + + Gibt an, ob die -Auflistung das angegebene -Objekt enthält. + true, wenn die Auflistung das angegebene Objekt enthält. + Das -Objekt, für das eine Überprüfung erfolgen soll. + + + Kopiert die -Auflistung in ein -Array, wobei am angegebenen Index begonnen wird. + Ein -Arrayobjekt, in das die -Auflistung kopiert werden soll. + Der nullbasierte Index in , an dem die -Auflistung kopiert werden soll. + + + Ruft die Anzahl der Elemente in der -Auflistung ab. + Die Anzahl der -Objekte in der -Auflistung. + + + Ruft einen Enumerator ab, mit dem die -Auflistung durchlaufen werden kann. + Ein Enumerator für die -Auflistung. + + + Ruft den Knoten am angegebenen Index der -Auflistung ab oder legt diesen fest. + Die am angegebenen Index in der Auflistung.Wenn größer als die Anzahl oder gleich der Anzahl der Knoten in der Auflistung ist, ist der Rückgabewert null. + Der nullbasierte Index in der -Auflistung. + + + Entfernt das angegebene -Objekt aus der Auflistung. + true, wenn das angegebene Objekt aus der Auflistung entfernt wurde. + Das zu entfernende -Objekt. + + + + Ruft einen Enumerator ab, mit dem die -Auflistung durchlaufen werden kann. + Ein Enumerator für die -Auflistung. + + + Konvertiert die Objekte in der Auflistung in den angegebenen Typ.Der Aufruf dieser Methode entspricht dem Aufruf von , wobei der zweite Parameter auf false festgelegt wird. Das bedeutet, dass für Elemente, die nicht konvertiert werden können, keine Ausnahme ausgelöst wird. + Eine -Auflistung, die den konvertierten Inhalt der ursprünglichen Auflistung darstellt. + Den Typ, in den Elemente in der Auflistung konvertiert werden. + + + + + + Konvertiert die Objekte in der Auflistung in den angegebenen Typ und verwendet die angegebene Fehlertoleranz, um Fehler zu bearbeiten oder zu ignorieren, die einem Typ zugeordnet sind, der keine Konvertierungszuordnung besitzt. + Eine -Auflistung, die den konvertierten Inhalt der ursprünglichen Auflistung darstellt. + Den Typ, in den Elemente in der Auflistung konvertiert werden. + Ein boolescher Wert, der bestimmt, wie Konvertierungsfehler behandelt werden.Wenn auf true festgelegt ist, führen Konvertierungsfehler aufgrund einer fehlenden Zuordnung für die Verschiebung dazu, dass die Konvertierung nicht durchgeführt werden kann, und Ausnahmen werden ausgelöst.Wenn auf false festgelegt ist, werden Typen, die aufgrund einer fehlenden Zuordnung für die Verschiebung nicht konvertiert werden konnten, ohne Konvertierung in die zurückgegebene Auflistung kopiert. + + + + + + Stellt ein Benutzer- oder Gruppenkonto dar. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen Namens. + Der zum Erstellen des -Objekts verwendete Name.Dieser Parameter darf nicht null oder eine leere Zeichenfolge sein. + + ist null. + + ist eine leere Zeichenfolge.– oder – ist zu lang. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen Domänen- und Kontonamens. + Der Name der Domäne.Dieser Parameter kann null oder eine leere Zeichenfolge sein.Domänennamen, die NULL-Werte sind, werden wie eine leere Zeichenfolge behandelt. + Der Kontoname.Dieser Parameter darf nicht null oder eine leere Zeichenfolge sein. + + ist null. + + ist eine leere Zeichenfolge.– oder – ist zu lang.– oder – ist zu lang. + + + Gibt einen Wert zurück, der angibt, ob dieses -Objekt gleich einem angegebenen Objekt ist. + true, wenn ein Objekt mit demselben zugrunde liegenden Typ und Wert wie dieses -Objekt ist, andernfalls false. + Ein Objekt, das mit diesem -Objekt verglichen werden soll, oder null. + + + Fungiert als Hashfunktion für das aktuelle -Objekt.Sie können die -Methode in Hashalgorithmen und Datenstrukturen wie Hashtabellen verwenden. + Ein Hashwert für das aktuelle -Objekt. + + + Gibt einen Wert zurück, der angibt, ob der angegebene Typ ein gültiger Verschiebungstyp für die -Klasse ist. + true, wenn ein gültiger Verschiebungstyp für die -Klasse ist, andernfalls false. + Der Typ, dessen Gültigkeit abgefragt wird, und der als eine Konvertierung von fungieren soll.Die folgenden Zieltypen sind gültig:- - + + + Vergleicht zwei -Objekte auf Gleichheit.Diese werden als gleich betrachtet, wenn Sie dieselbe kanonische Namensdarstellung besitzen, wie die von der -Eigenschaft zurückgegebene Darstellung, oder wenn beide null sind. + true, wenn und gleich sind, andernfalls false. + Der linke Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Vergleicht zwei -Objekte auf Ungleichheit.Diese werden als ungleich betrachtet, wenn Sie andere kanonische Namensdarstellungen besitzen, als die von der -Eigenschaft zurückgegebenen Darstellungen, oder wenn eines der Objekte null ist und das andere nicht. + true, wenn und ungleich sind, andernfalls false. + Der linke Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Gibt den Kontonamen im Format Domäne\Konto für das durch das -Objekt dargestellte Konto zurück. + Der Kontoname im Format Domäne\Konto. + + + Übersetzt den Kontonamen, der durch das -Objekt dargestellt wird, in einen anderen von abgeleiteten Typ. + Die konvertierte Identität. + Der Zieltyp für die Konvertierung von .Der Zieltyp muss ein Typ sein, der von der -Methode als gültig betrachtet wird. + + ist null. + + ist kein -Typ. + Manche oder alle Identitätsverweise konnten nicht übersetzt werden. + Der Quellkontoname ist zu lang.– oder –Ein Win32-Fehlercode wurde zurückgegeben. + + + + + + Gibt eine Zeichenfolgendarstellung dieses -Objekts in Großbuchstaben zurück. + Die Zeichenfolgendarstellung dieses -Objekts in Großbuchstaben. + + + + + + Stellt eine Sicherheits-ID (SID) dar und bietet Marshalling und Vergleichsoperationen für SIDs. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung einer angegebenen binären Darstellung einer Sicherheits-ID. + Das Bytearray, das die SID darstellt. + Das Byteoffset, das als Startindex in verwendet werden soll. + + + Initialisiert eine neue Instanz der -Klasse mit einer ganzen Zahl, die die Binärform einer Sicherheits-ID (SID) darstellt. + Eine ganze Zahl, die die Binärform einer SID darstellt. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen bekannten Typs der Sicherheits-ID und der Domänen-SID. + Einer der Enumerationswerte.Dieser Wert darf nicht sein. + Die Domänen-SID.Dieser Wert ist für die folgenden -Werte erforderlich.Dieser Parameter wird für alle anderen -Werte ignoriert.- - - - - - - - - - - - - + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung der angegebenen Sicherheits-ID im SDDL-Format (Security Descriptor Definition Language). + SDDL-Zeichenfolge für die SID, die zum Erstellen des -Objekts verwendet wird. + + + Gibt den Teil der Kontodomänen-SID von der Sicherheits-ID (SID) zurück, die durch das -Objekt dargestellt wird, wenn die SID die SID eines Windows-Kontos darstellt.Wenn die SID nicht die SID eines Windows-Kontos darstellt, gibt diese Eigenschaft zurück. + Der Teil der Kontodomänen-SID der SID, die durch das -Objekt dargestellt wird, wenn die SID die SID eines Windows-Kontos darstellt. Andernfalls wird zurückgegeben. + + + Gibt die Länge in Bytes der durch das -Objekt dargestellten Sicherheits-ID zurück. + Die Länge in Bytes der durch das -Objekt dargestellten SID. + + + Vergleicht das aktuelle -Objekt mit dem angegebenen -Objekt. + Eine Zahl mit Vorzeichen, die das Verhältnis zwischen dem Wert dieser Instanz und angibt.Rückgabewert BeschreibungKleiner als 0 Diese Instanz ist kleiner als . Zero Diese Instanz ist gleich . Größer als 0 (null) Diese Instanz ist größer als . + Das Objekt, das mit dem aktuellen Objekt verglichen werden soll. + + + Gibt einen Wert zurück, der angibt, ob dieses -Objekt gleich einem angegebenen Objekt ist. + true, wenn ein Objekt mit demselben zugrunde liegenden Typ und Wert wie dieses -Objekt ist, andernfalls false. + Ein Objekt, das mit diesem -Objekt verglichen werden soll, oder null. + + + Gibt an, ob das angegebene -Objekt mit dem aktuellen -Objekt identisch ist. + true, wenn der Wert von dem Wert des aktuellen -Objekts entspricht. + Das Objekt, das mit dem aktuellen Objekt verglichen werden soll. + + + Kopiert die binäre Darstellung der angegebenen Sicherheits-ID, die durch die -Klasse dargestellt wird, in ein Bytearray. + Das Bytearray, in das die SID kopiert wird. + Das Byteoffset, das als Startindex in verwendet werden soll. + + + Fungiert als Hashfunktion für das aktuelle -Objekt.Sie können die -Methode in Hashalgorithmen und Datenstrukturen wie Hashtabellen verwenden. + Ein Hashwert für das aktuelle -Objekt. + + + Gibt einen Wert zurück, der angibt, ob die durch dieses -Objekt dargestellte SID die gültige Sicherheits-ID eines Windows-Kontos ist. + true, wenn die durch dieses -Objekt dargestellte SID die gültige SID eines Windows-Kontos ist, andernfalls false. + + + Gibt einen Wert zurück, der angibt, ob die durch dieses -Objekt dargestellte SID aus derselben Domäne stammt wie die angegebene Sicherheits-ID. + true, wenn sich die durch dieses -Objekt dargestellte SID in derselben Domäne befindet wie die -SID, andernfalls false. + Die SID, die mit diesem -Objekt verglichen werden soll. + + + Gibt einen Wert zurück, der angibt, ob der angegebene Typ ein gültiger Verschiebungstyp für die -Klasse ist. + true, wenn ein gültiger Verschiebungstyp für die -Klasse ist, andernfalls false. + Der Typ, dessen Gültigkeit abgefragt wird, und der als eine Konvertierung von fungieren soll.Die folgenden Zieltypen sind gültig:- - + + + Gibt einen Wert zurück, der angibt, ob das -Objekt dem angegebenen bekannten Typ der Sicherheits-ID entspricht. + true, wenn der SID-Typ für das -Objekt ist, andernfalls false. + Ein Wert, der mit dem -Objekt verglichen werden soll. + + + Gibt die maximale Größe in Bytes für die binäre Darstellung der Sicherheits-ID zurück. + + + Gibt die Mindestgröße in Bytes für die binäre Darstellung der Sicherheits-ID zurück. + + + Vergleicht zwei -Objekte auf Gleichheit.Diese werden als gleich betrachtet, wenn Sie dieselbe kanonische Darstellung besitzen, wie die von der -Eigenschaft zurückgegebene Darstellung, oder wenn beide null sind. + true, wenn und gleich sind, andernfalls false. + Der linke Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte Operand, der für die Gleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Vergleicht zwei -Objekte auf Ungleichheit.Diese werden als ungleich betrachtet, wenn Sie andere kanonische Namensdarstellungen besitzen, als die von der -Eigenschaft zurückgegebene Darstellung, oder wenn eines der Objekte null ist und das andere nicht. + true, wenn und ungleich sind, andernfalls false. + Der linke Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + Der rechte Operand, der für die Ungleichheitsprüfung verwendet werden soll.Dieser Parameter kann null sein. + + + Gibt die Sicherheits-ID (SID) im SDDL-Format (Security Descriptor Definition Language) für das durch das -Objekt dargestellte Konto zurück.Ein Beispiel für das SDDL-Formats ist S-1-5-9. + Die SID im SDDL-Format für das durch das -Objekt dargestellte Konto. + + + Übersetzt den Kontonamen, der durch das -Objekt dargestellt wird, in einen anderen von abgeleiteten Typ. + Die konvertierte Identität. + Der Zieltyp für die Konvertierung von .Der Zieltyp muss ein Typ sein, der von der -Methode als gültig betrachtet wird. + + ist null. + + ist kein -Typ. + Manche oder alle Identitätsverweise konnten nicht übersetzt werden. + Ein Win32-Fehlercode wurde zurückgegeben. + + + + + + Gibt eine SDDL-Zeichenfolge (Security Descriptor Definition Language) in Großbuchstaben für die durch das -Objekt darstellte Sicherheits-ID zurück. + Eine SDDL-Zeichenfolge in Großbuchstaben für die durch das -Objekt dargestellte SID. + + + + + + Definiert die Berechtigungen des Benutzerkontos, das dem Zugriffstoken zugeordnet ist. + + + Der Benutzer kann den Standardbesitzer, die primäre Gruppe oder die DACL (Discretionary Access List, freigegebene Zugriffssteuerungsliste) des Tokens ändern. + + + Der Benutzer kann die Attribute der Gruppen im Token ändern. + + + Der Benutzer kann Berechtigungen im Token aktivieren oder deaktivieren. + + + Der Benutzer kann die Sitzungs-ID des Tokens anpassen. + + + Der Benutzer verfügt über den insgesamt möglichen Zugriff auf das Token. + + + Der Benutzer kann ein primäres Token an einen Prozess anfügen. + + + Der Benutzer kann das Token duplizieren. + + + Der Benutzer kann für einen Client einen Identitätswechsel ausführen. + + + Der maximale Wert, der für die -Enumeration zugewiesen werden kann. + + + Der Benutzer kann das Token abfragen. + + + Der Benutzer kann die Quelle des Tokens abfragen. + + + Der Benutzer verfügt über Standardleseberechtigungen und die -Berechtigung für das Token. + + + Der Benutzer verfügt über Standardschreibberechtigungen und die -Berechtigung sowie die -Berechtigung für das Token. + + + Definiert eine Gruppe häufig verwendeter Sicherheits-IDs (SIDs). + + + Gibt eine SID an, die der Gruppe der Kontoadministratoren entspricht. + + + Gibt eine SID an, die der Gruppe der Zertifikatsadministratoren entspricht. + + + Gibt eine SID an, die der Gruppe der Computerkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Controllerkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Domänenadministratorenkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Domänengastkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Domänenbenutzerkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Organisationsadministratoren entspricht. + + + Gibt eine SID an, die der Gruppe der Gastkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Kerberos-Zielkonten entspricht. + + + Gibt eine SID an, die der Gruppe der Richtlinienadministratoren entspricht. + + + Gibt eine SID an, die dem RAS- und IAS-Serverkonto entspricht. + + + Gibt eine SID an, die der Gruppe der Schemaadministratoren entspricht. + + + Gibt eine SID für das anonyme Konto an. + + + Gibt eine SID für einen authentifizierten Benutzer an. + + + Gibt eine SID für einen Batchprozess an.Diese SID wird dem Prozess eines Tokens beim Anmelden als Batchauftrag hinzugefügt. + + + Gibt eine SID an, die dem Konto der Konten-Operatoren entspricht. + + + Gibt eine SID an, die dem Administratorkonto entspricht. + + + Gibt eine SID an, die der Windows-Autorisierungszugriffsgruppe entspricht. + + + Gibt eine SID an, die der Gruppe der Sicherungs-Operatoren entspricht. + + + Gibt eine SID an, die dem Domänenkonto entspricht. + + + Gibt eine SID an, die dem Gastkonto entspricht. + + + Gibt eine SID an, die es Benutzern ermöglicht, eingehende Gesamtstrukturvertrauensstellungen zu erstellen.Sie wird dem Token von Benutzern hinzugefügt, die Mitglieder der integrierten Gruppe Erstellungen eingehender Gesamtstrukturvertrauensstellung in der Stammdomäne der Gesamtstruktur sind. + + + Gibt eine SID an, die der Gruppe der Netzwerk-Operatoren entspricht. + + + Gibt eine SID für die Gruppe von Benutzern an, die Remotezugriff zur Überwachung des Computers haben. + + + Gibt eine SID für die Gruppe von Benutzern an, die Remotezugriff zur Planung der Protokollierung für Leistungsindikatoren auf diesem Computer haben. + + + Gibt eine SID an, die der Gruppe der Hauptbenutzer entspricht. + + + Gibt eine SID an, die den Windows 2000-kompatiblen Konten entspricht. + + + Gibt eine SID an, die der Gruppe der Druck-Operatoren entspricht. + + + Gibt eine SID an, die den Remotedesktopbenutzern entspricht. + + + Gibt eine SID an, die dem Replikationsdienstkonto entspricht. + + + Gibt eine SID an, die der Gruppe der System-Operatoren entspricht. + + + Gibt eine SID an, die den integrierten Benutzerkonten entspricht. + + + Gibt eine Erstellergruppenserver-SID an. + + + Gibt eine SID an, die der Erstellergruppe eines Objekts entspricht. + + + Gibt eine Erstellerbesitzerserver-SID an. + + + Gibt eine SID an, die dem Besitzer oder dem Ersteller eines Objekts entspricht. + + + Gibt eine SID für ein DFÜ-Konto an. + + + Gibt eine SID an, die beim Authentifizieren des Clients durch das Microsoft Digest-Authentifizierungspaket vorhanden war. + + + Gibt eine SID für einen Organisationscontroller an. + + + Gibt eine SID für ein interaktives Konto an.Diese SID wird dem Prozess eines Tokens bei der interaktiven Anmeldung hinzugefügt. + + + Gibt eine SID an, die einem lokalen Dienst entspricht. + + + Gibt eine lokale SID an. + + + Gibt eine SID an, die dem lokalen System entspricht. + + + Gibt eine SID an, die den Anmelde-IDs entspricht. + + + Gibt die maximal definierte SID in der -Enumeration an. + + + Gibt eine SID an, die einem Netzwerkdienst entspricht. + + + Gibt eine SID für ein Netzwerkkonto an.Diese SID wird dem Prozess eines Tokens bei der Anmeldung über ein Netzwerk hinzugefügt. + + + Gibt eine SID für die Windows NT-Zertifizierungsstelle an. + + + Gibt eine SID an, die beim Authentifizieren des Clients durch das Microsoft NTLM-Authentifizierungspaket vorhanden war. + + + Gibt eine NULL-SID an. + + + Gibt eine SID an, die beim Authentifizieren des Benutzer über eine Gesamtstruktur mit aktivierter selektiver Authentifizierungsoption vorhanden war.Wenn diese SID vorhanden ist, kann nicht vorhanden sein. + + + Gibt eine Proxy-SID an. + + + Gibt eine SID an, die Remoteanmeldungen entspricht. + + + Gibt eine SID für beschränkten Code an. + + + Gibt eine SID an, die beim Authentifizieren des Clients durch das Secure Channel-Authentifizierungspaket (SSL/TLS) vorhanden war. + + + Gibt eine SID für sich selbst an. + + + Gibt eine SID für einen Dienst an.Diese SID wird dem Prozess eines Tokens bei der Anmeldung als Dienst hinzugefügt. + + + Gibt eine SID an, die einem Terminalserverkonto entspricht. + + + Gibt eine SID an, die bei der Authentifizierung des Benutzers aus der Gesamtstruktur oder über eine Vertrauensstellung vorhanden war, für die die selektive Authentifizierungsoption nicht aktiviert ist.Wenn diese SID vorhanden ist, kann nicht vorhanden sein. + + + Gibt an, dass eine SID in einem Server vorhanden ist, der Terminal Server-Lizenzen ausgeben kann. + + + Gibt eine SID an, die allen entspricht. + + + Gibt allgemeine Rollen an, die mit verwendet werden. + + + Kontooperatoren verwalten die Benutzerkonten auf einem Computer oder in einer Domäne. + + + Administratoren haben vollständigen und uneingeschränkten Zugriff auf den Computer oder die Domäne. + + + Backupoperatoren können Sicherheitsbeschränkungen lediglich für das Sichern oder Wiederherstellen von Dateien überschreiben. + + + Für Gäste gelten umfassendere Einschränkungen als für Benutzer. + + + Hauptbenutzer verfügen über die umfassendsten Administratorberechtigungen mit einigen Einschränkungen.Daher können Hauptbenutzer neben zertifizierten Anwendungen auch ältere Anwendungen ausführen. + + + Druckoperatoren können die Druckersteuerung übernehmen. + + + Replikationsdienste unterstützen die Replikation von Dateien in einer Domäne. + + + Systemoperatoren verwalten einen bestimmten Computer. + + + Versehentliche oder beabsichtigte systemweite Änderungen durch Benutzer sind nicht möglich.Somit können Benutzer zertifizierte Anwendungen ausführen, jedoch nur wenige ältere Anwendungen. + + + Stellt einen Windows-Benutzer dar. + + + Initialisiert eine neue Instanz der -Klasse für den Benutzer, der durch das angegebene Windows-Kontotoken dargestellt wird. + Das Kontotoken für den Benutzer, für den der Code ausgeführt wird. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Initialisiert eine neue Instanz der -Klasse für den Benutzer, der durch das angegebene Windows-Kontotoken und den angegebenen Authentifizierungstyp dargestellt wird. + Das Kontotoken für den Benutzer, für den der Code ausgeführt wird. + (Nur für Informationszwecke.) Der zur Identifizierung des Benutzers verwendete Authentifizierungstyp.Weitere Informationen finden Sie in den Hinweisen. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [SICHERHEITSRELEVANT] Ruft dieses für diese -Instanz ab. + Gibt einen Wert vom Typ zurück. + + + Gibt alle vom verwendeten Ressourcen frei. + + + Gibt die von verwendeten nicht verwalteten Ressourcen und optional die verwalteten Ressourcen frei. + true, um sowohl verwaltete als auch nicht verwaltete Ressourcen freizugeben, false, um ausschließlich nicht verwaltete Ressourcen freizugeben. + + + Gibt ein -Objekt zurück, das Sie als Sentinelwert im Code verwenden können, um einen anonymen Benutzer darzustellen.Der Eigenschaftswert stellt nicht die integrierte anonyme Identität dar, die vom Windows-Betriebssystem verwendet wird. + Ein Objekt, das einen anonymen Benutzer darstellt. + + + Gibt ein -Objekt zurück, das den aktuellen Windows-Benutzer darstellt. + Ein Objekt, das den aktuellen Benutzer darstellt. + The caller does not have the correct permissions. + + + + + + Gibt ein -Objekt zurück, das eine Windows-Identität für den Thread oder den Prozess darstellt, je nach Wert des -Parameters. + Ein Objekt, das einen Windows-Benutzer darstellt. + true, um nur die zurückzugeben, wenn der Thread gerade einen Identitätswechsel ausführt. false, um die des Threads zurückzugeben, wenn er einen Identitätswechsel ausführt, oder die des Prozesses, wenn der Thread gerade keinen Identitätswechsel ausführt. + + + + + + Gibt ein -Objekt zurück, das den aktuellen Windows-Benutzer darstellt, der die angegebene gewünschte Tokenzugriffsebene verwendet. + Ein Objekt, das den aktuellen Benutzer darstellt. + Eine bitweise Kombination der Enumerationswerte. + + + + + + Ruft die Gruppen ab, zu denen der aktuelle Windows-Benutzer gehört. + Ein Objekt, das die Gruppen darstellt, zu denen der Windows-Benutzer gehört. + + + Ruft die Identitätswechselebene für den Benutzer ab. + Einer der Enumerationswerte, der die Personifikationsebene angibt. + + + Ruft einen Wert ab, der angibt, ob das Benutzerkonto vom System als anonymes Konto identifiziert wird. + true, wenn das Benutzerkonto ein anonymes Konto ist, andernfalls false. + + + Ruft einen Wert ab, der angibt, ob das Benutzerkonto vom System als -Konto identifiziert wird. + true, wenn das Benutzerkonto ein -Konto ist, andernfalls false. + + + Ruft einen Wert ab, der angibt, ob das Benutzerkonto vom System als -Konto identifiziert wird. + true, wenn das Benutzerkonto ein -Konto ist, andernfalls false. + + + Ruft die Sicherheits-ID für den Tokenbesitzer ab. + Ein Objekt für den Tokenbesitzer. + + + Führt die angegebene Aktion als imitierte Windows-Identität aus.Statt einen imitierten Methodenaufruf zu verwenden und die Funktion in auszuführen, können Sie verwenden und die Funktion direkt als Parameter angeben. + Das SafeAccessTokenHandle der imitierten Windows-Identität. + Die auszuführende System.Action. + + + Führt die angegebene Funktion als imitierte Windows-Identität aus.Statt einen imitierten Methodenaufruf zu verwenden und die Funktion in auszuführen, können Sie verwenden und die Funktion direkt als Parameter angeben. + Gibt das Ergebnis der Funktion zurück. + Das SafeAccessTokenHandle der imitierten Windows-Identität. + Die auszuführende System.Func. + Der Typ des Objekts, das von der Funktion verwendet und zurückgegeben wird. + + + Ruft die Sicherheits-ID für den Benutzer ab. + Ein Objekt für den Benutzer. + + + Ermöglicht es Code, die Windows-Gruppenmitgliedschaft eines Windows-Benutzers zu überprüfen. + + + Initialisiert eine neue Instanz der -Klasse unter Verwendung des angegebenen -Objekts. + Das Objekt, aus dem die neue Instanz von erstellt werden soll. + + ist null. + + + Bestimmt, ob der aktuelle Prinzipal zur Windows-Benutzergruppe mit der angegebenen relativen ID (RID) gehört. + true, wenn der aktuelle Prinzipal Mitglied der angegebenen Windows-Benutzergruppe ist, d. h. in einer bestimmten Rolle, andernfalls false. + Die RID der Windows-Benutzergruppe, in der der Status der Mitgliedschaft des Prinzipals überprüft werden soll. + + + + + + Bestimmt, ob der aktuelle Prinzipal zur Windows-Benutzergruppe mit der angegebenen Sicherheits-ID (SID) gehört. + true, wenn der aktuelle Prinzipal Mitglied der angegebenen Windows-Benutzergruppe ist, andernfalls false. + Ein , der eine Windows-Benutzergruppe eindeutig identifiziert. + + ist null. + Windows hat einen Win32-Fehler zurückgegeben. + + + + + + Bestimmt, ob der aktuelle Prinzipal zu der Windows-Benutzergruppe mit der angegebenen gehört. + true, wenn der aktuelle Prinzipal Mitglied der angegebenen Windows-Benutzergruppe ist, andernfalls false. + Einer der -Werte. + + ist kein gültiger -Wert. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/es/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/es/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..59e3401 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/es/System.Security.Principal.Windows.xml @@ -0,0 +1,733 @@ + + + + System.Security.Principal.Windows + + + + [CRÍTICO PARA LA SEGURIDAD] Proporciona un identificador seguro para un token de acceso de un proceso o subproceso de Windows.Para obtener más información, consulte Tokens de acceso. + + + [CRÍTICO PARA LA SEGURIDAD] Inicializa una nueva instancia de la clase . + Objeto que representa el controlador preexistente que se va a usar.Usar devuelve un identificador no válido. + + + [CRÍTICO PARA LA SEGURIDAD] Devuelve un identificador no válido al crear una instancia de un objeto con . + Devuelve un objeto . + + + [CRÍTICO PARA LA SEGURIDAD] Obtiene un valor que indica si el identificador no es válido. + true si el identificador no es válido; en caso contrario, false. + + + Representa una excepción para una entidad de seguridad cuya identidad no se pudo asignar a una identidad conocida. + + + Inicializa una nueva instancia de la clase . + + + Inicializa una nueva instancia de la clase utilizando el mensaje de error especificado. + Mensaje de error que explica la razón de la excepción. + + + Inicializa una nueva instancia de la clase utilizando el mensaje y la excepción interna especificados. + Mensaje de error que explica la razón de la excepción. + La excepción que es la causa de la excepción actual.Si no es null, la excepción actual se inicia en un bloque catch que controla la excepción interna. + + + Representa la colección de identidades no asignadas para una excepción . + Colección de identidades no asignadas. + + + Representa una identidad y es la clase base correspondiente a las clases y .Esta clase no proporciona un constructor público y, por lo tanto, no se puede heredar. + + + Devuelve un valor que indica si el objeto especificado es igual a esta instancia de la clase . + Es true si es un objeto con el mismo tipo subyacente y el mismo valor que esta instancia ; de lo contrario, es false. + Objeto que se compara con este objeto , o una referencia null. + + + Actúa como una función hash para . es apto para el uso en algoritmos hash y estructuras de datos como una tabla hash. + El código hash de este objeto . + + + Devuelve un valor que indica si el tipo especificado es un tipo de traducción válido para la clase . + Es true si es un tipo de traducción válido para la clase ; de lo contrario, es false. + Tipo que se consulta para comprobar su validez para actuar como conversión de .Son válidos los siguientes tipos de destino: + + + Compara dos objetos para determinar si son iguales.Se consideran iguales si tienen la misma representación de nombre canónico que ha devuelto la propiedad o si ambos son null. + Es true si y son iguales; en caso contrario, es false. + Operando izquierdo que se debe utilizar para la comparación de igualdad.Este parámetro puede ser null. + Operando derecho que se debe utilizar para la comparación de igualdad.Este parámetro puede ser null. + + + Compara dos objetos para determinar si no son iguales.No se consideran iguales si tienen las representaciones del nombre canónico diferentes que la devuelta por la propiedad o si uno de los objetos es null y el otro no. + true si y no son iguales; en caso contrario, false. + Operando izquierdo que se debe utilizar para la comparación de desigualdad.Este parámetro puede ser null. + Operando derecho que se debe utilizar para la comparación de desigualdad.Este parámetro puede ser null. + + + Obtiene la representación de cadena de la identidad representada por el objeto . + Identidad en formato de cadena. + + + Traduce el nombre de cuenta representado por el objeto a otro tipo derivado de . + Identidad convertida. + Tipo de destino correspondiente a la conversión de . + + + Obtiene el valor de cadena de la identidad representada por el objeto . + Obtiene el valor de cadena de la identidad representada por el objeto . + + + Representa una colección de objetos y proporciona un medio de convertir conjuntos derivados de en tipos derivados de . + + + Inicializa una nueva instancia de la clase con cero elementos en la colección. + + + Inicializa una nueva instancia de la clase usando el tamaño inicial especificado. + Número de elementos inicial de la colección.El valor de no es más que una sugerencia; no es necesariamente el número máximo de elementos creados. + + + Agrega un objeto a la colección . + Objeto que se va a agregar a la colección. + + + Borra todos los objetos de la colección . + + + Indica si la colección contiene el objeto especificado. + Es true si la colección contiene el objeto especificado. + Objeto que se va a comprobar. + + + Copia la colección en una matriz , empezando por el índice especificado. + Objeto de la matriz en el que se va a copiar la colección . + Índice de base cero de donde se va a copiar la colección . + + + Obtiene el número de elementos de la colección . + Número de objetos de la colección . + + + Obtiene un enumerador que puede usarse para recorrer en iteración la colección . + Un enumerador de la colección . + + + Obtiene o establece el nodo en el índice especificado de la colección . + + situada en el índice especificado de la colección.Si es mayor o igual que el número de nodos de la colección, el valor devuelto es una referencia null. + Índice de base cero de la colección . + + + Quita el objeto especificado de la colección. + Es true si el objeto especificado se eliminó de la colección. + Objeto que se quita. + + + + Obtiene un enumerador que puede usarse para recorrer en iteración la colección . + Un enumerador de la colección . + + + Convierte los objetos de la colección al tipo especificado.Llamar a este método equivale a llamar a con el segundo parámetro establecido en false, lo que significa que no se producirán excepciones para los elementos cuya conversión no se realice correctamente. + Colección que representa el contenido convertido de la colección original. + Tipo al que se convertirán los elementos de la colección. + + + + + + Convierte los objetos de la colección al tipo especificado y usa la tolerancia a errores especificada para controlar u omitir los errores asociados con tipos que no tengan asignación de conversión. + Colección que representa el contenido convertido de la colección original. + Tipo al que se convertirán los elementos de la colección. + Valor booleano que determina cómo se controlan los errores de conversión.Si es true, la conversión no se realizará correctamente y se producirá una excepción cuando se produzca un error por no haberse encontrado una asignación de conversión.Si es false, los tipos cuya asignación de conversión no se encuentre se copiarán sin convertirse en la colección devuelta. + + + + + + Representa un usuario o cuenta de grupo. + + + Inicializa una nueva instancia de la clase utilizando el nombre especificado. + Nombre utilizado para crear el objeto .Este parámetro no puede ser null ni una cadena vacía. + + es null. + + es una cadena vacía.O bien es demasiado largo. + + + Inicializa una nueva instancia de la clase utilizando el nombre de dominio y el nombre de cuenta especificados. + Nombre del dominio.Este parámetro puede ser null o una cadena vacía.Los nombres de dominio que son valores null se tratan como una cadena vacía. + Nombre de la cuenta.Este parámetro no puede ser null ni una cadena vacía. + + es null. + + es una cadena vacía.O bien es demasiado largo.O bien es demasiado largo. + + + Devuelve un valor que indica si este objeto equivale a un objeto especificado. + Es true si es un objeto con el mismo tipo subyacente y el mismo valor que este objeto ; de lo contrario, es false. + Objeto que se va a comparar con este objeto , o null. + + + Sirve como función hash para el objeto actual.El método es apto para algoritmos hash y estructuras de datos como una tabla hash. + Valor hash para el objeto actual. + + + Devuelve un valor que indica si el tipo especificado es un tipo de conversión válido para la clase . + true si es un tipo de conversión válido para la clase ; de lo contrario false. + Tipo cuya validez se consulta para servir de conversión de .Son válidos los siguientes tipos de destino:- - + + + Compara dos objetos para determinar si son iguales.Se consideran iguales si tienen la misma representación de nombre canónico que ha devuelto la propiedad o si ambos son null. + true si y son iguales; en caso contrario, false. + Operando izquierdo que se va a utilizar para la comparación de igualdad.Este parámetro puede ser null. + Operando derecho que se va a utilizar para la comparación de igualdad.Este parámetro puede ser null. + + + Compara dos objetos para determinar si no son iguales.No son considerados iguales si tienen representaciones del nombre canónico diferentes al devuelto por la propiedad o si uno de los objetos es null y el otro no lo es. + true si y no son iguales; en caso contrario, false. + Operando izquierdo que se va a utilizar para la comparación de desigualdad.Este parámetro puede ser null. + Operando derecho que se va a utilizar para la comparación de desigualdad.Este parámetro puede ser null. + + + Devuelve el nombre de cuenta, en formato Dominio\Cuenta, para la cuenta representada por el objeto . + El nombre de cuenta, en formato Dominio\Cuenta. + + + Convierte el nombre de cuenta representado por el objeto en otro tipo derivado de . + Identidad convertida. + Tipo de destino para la conversión desde .El tipo de destino debe ser un tipo considerado válido por el método . + El valor de es null. + + no es un tipo . + No se pudieron convertir algunas o todas las referencias de identidad. + El nombre de cuenta del origen es demasiado largo.O bienSe devolvió un código de error de Win32. + + + + + + Devuelve una representación de cadena en mayúsculas de este objeto . + Representación de cadena en mayúsculas de este objeto . + + + + + + Representa un identificador de seguridad (SID) y proporciona cálculo de referencias y operaciones de comparación de SID. + + + Inicializa una nueva instancia de la clase utilizando una representación binaria especificada de un identificador de seguridad (SID). + Matriz de bytes que representa el SID. + Desplazamiento en bytes utilizado como índice inicial en . + + + Inicializa una nueva instancia de la clase utilizando un entero que representa el formato binario de un identificador de seguridad (SID). + Entero que representa el formato binario de un SID. + + + Inicializa una nueva instancia de la clase utilizando el tipo de identificador de seguridad (SID) y el SID del dominio conocidos especificados. + Uno de los valores de la enumeración.Este valor no debe ser . + SID del dominio.Este valor es obligatorio para los valores de tipo siguientes.Este parámetro se omite para cualquier otro valor de tipo .- - - - - - - - - - - - - + + + Inicializa una nueva instancia de la clase utilizando el identificador de seguridad (SID) especificado en formato de Lenguaje de definición de descriptores de seguridad (SDDL). + Cadena SDDL del SID utilizado para crear el objeto . + + + Devuelve la parte correspondiente al identificador de seguridad (SID) del dominio de la cuenta del SID representado por el objeto si el SID representa un SID de cuenta de Windows.Si el SID no representa un SID de cuenta de Windows, esta propiedad devuelve . + Parte correspondiente al SID del dominio de la cuenta del SID representado por el objeto si el SID representa un SID de cuenta de Windows; de lo contrario, devuelve . + + + Devuelve la longitud, en bytes, del identificador de seguridad (SID) representado por el objeto . + Longitud, en bytes, del SID representado por el objeto . + + + Compara el objeto actual con el objeto especificado. + Número con signo que indica los valores relativos de esta instancia y .Valor devuelto Descripción Menor que cero Esta instancia es menor que . Zero Esta instancia es igual que . Mayor que cero Esta instancia es mayor que . + Objeto que se va a comparar con el objeto actual. + + + Devuelve un valor que indica si este objeto es igual que un objeto especificado. + Es true si es un objeto con el mismo tipo subyacente y el mismo valor que este objeto ; de lo contrario, es false. + Objeto que se va a comparar con este objeto , o null. + + + Indica si el objeto especificado es igual al objeto actual. + Es true si el valor de es igual al del objeto actual. + Objeto que se va a comparar con el objeto actual. + + + Copia la representación binaria del identificador de seguridad (SID) especificado representado por la clase en una matriz de bytes. + Matriz de bytes que recibe el SID copiado. + Desplazamiento en bytes utilizado como índice inicial en . + + + Sirve como función hash para el objeto actual.El método es apto para algoritmos hash y estructuras de datos como una tabla hash. + Valor hash para el objeto actual. + + + Devuelve un valor que indica si el identificador de seguridad (SID) representado por este objeto es un SID de cuenta de Windows válido. + Es true si el SID representado por este objeto es un SID de cuenta de Windows válido; de lo contrario, es false. + + + Devuelve un valor que indica si el identificador de seguridad (SID) representado por este objeto es del mismo dominio que el SID especificado. + Es true si el SID representado por este objeto está en el mismo dominio que el SID ; de lo contrario, es false. + SID que se va a comparar con este objeto . + + + Devuelve un valor que indica si el tipo especificado es un tipo de traducción válido para la clase . + Es true si es un tipo de traducción válido para la clase ; de lo contrario, es false. + Tipo que se consulta para comprobar su validez para actuar como conversión de .Son válidos los siguientes tipos de destino:- - + + + Devuelve un valor que indica si el objeto coincide con el tipo de identificador de seguridad (SID) conocido especificado. + Es true si es el tipo del SID del objeto ; de lo contrario, es false. + Valor que se compara con el objeto . + + + Devuelve el tamaño máximo, en bytes, de la representación binaria del identificador de seguridad. + + + Devuelve el tamaño mínimo, en bytes, de la representación binaria del identificador de seguridad. + + + Compara dos objetos para determinar si son iguales.Son considerados iguales si tienen la misma representación canónica que ha devuelto la propiedad o si ambos son null. + Es true si y son iguales; en caso contrario, es false. + Operando izquierdo que se va a utilizar para la comparación de igualdad.Este parámetro puede ser null. + Operando derecho que se va a utilizar para la comparación de igualdad.Este parámetro puede ser null. + + + Compara dos objetos para determinar si no son iguales.No se consideran iguales si tienen las representaciones del nombre canónico diferentes que la devuelta por la propiedad o si uno de los objetos es null y el otro no. + true si y no son iguales; en caso contrario, false. + Operando izquierdo que se va a utilizar para la comparación de desigualdad.Este parámetro puede ser null. + Operando derecho que se va a utilizar para la comparación de desigualdad.Este parámetro puede ser null. + + + Devuelve el identificador de seguridad (SID), en formato SDDL, correspondiente a la cuenta representada por el objeto .Un ejemplo de formato SDDL es S-1-5-9. + SID, en formato SDDL, correspondiente a la cuenta representada por el objeto . + + + Traduce el nombre de cuenta representado por el objeto a otro tipo derivado de . + Identidad convertida. + Tipo de destino correspondiente a la conversión de .El tipo de destino debe ser un tipo considerado válido por el método . + El valor de es null. + + no es un tipo . + No se pudieron convertir algunas o todas las referencias de identidad. + Se devolvió un código de error de Win32. + + + + + + Devuelve una cadena SDDL en mayúsculas correspondiente al identificador de seguridad (SID) representado por este objeto . + Cadena SDDL en mayúsculas correspondiente al SID representado por el objeto . + + + + + + Define los privilegios de la cuenta de usuario asociada al símbolo (token) de acceso. + + + El usuario puede cambiar el propietario predeterminado, el grupo primario o la lista de control de acceso discrecional (DACL) del símbolo (token). + + + El usuario puede cambiar los atributos de los grupos del símbolo (token). + + + El usuario puede habilitar o deshabilitar los privilegios del símbolo (token). + + + El usuario puede ajustar el identificador de sesión del símbolo (token). + + + El usuario tiene todo el acceso posible al símbolo (token). + + + El usuario puede asociar un token primario a un proceso. + + + El usuario puede duplicar el símbolo (token). + + + El usuario puede suplantar un cliente. + + + Valor máximo que se puede asignar para la enumeración . + + + El usuario puede consultar el símbolo (token). + + + El usuario puede consultar el origen del símbolo (token). + + + El usuario tiene derechos de lectura estándar y el privilegio para el símbolo (token). + + + El usuario tiene derechos de escritura estándar y los privilegios y para el símbolo (token). + + + Define un conjunto de identificadores de seguridad (SID) comúnmente utilizados. + + + Indica un SID que coincide con el grupo de administradores de cuenta. + + + Indica un SID que coincide con el grupo de administradores de certificado. + + + Indica un SID que coincide con el grupo de equipos de cuenta. + + + Indica un SID que coincide con el grupo de controladores de cuenta. + + + Indica un SID que coincide con el grupo de administradores de dominio de cuenta. + + + Indica un SID que coincide con el grupo de invitados de dominio de cuenta. + + + Indica un SID que coincide con el grupo de usuarios de dominio de cuenta. + + + Indica un SID que coincide con el grupo de administradores de empresa. + + + Indica un SID que coincide con el grupo de invitados de cuenta. + + + Indica un SID que coincide con el grupo de destino Kerberos de la cuenta. + + + Indica un SID que coincide con el grupo de administradores de directivas. + + + Indica un SID que coincide con la cuenta de servidor RAS e IAS. + + + Indica un SID que coincide con el grupo de administradores de esquema. + + + Indica un SID para la cuenta anónima. + + + Indica un SID para un usuario autenticado. + + + Indica un SID para un proceso por lotes.Este SID se agrega al proceso de un símbolo (token) cuando inicia sesión como un trabajo por lotes. + + + Indica un SID que coincide con la cuenta de operadores de cuentas. + + + Indica un SID que coincide con la cuenta de administrador. + + + Indica un SID que coincide con el grupo de acceso de autorización de Windows. + + + Indica un SID que coincide con el grupo de operadores de copias de seguridad. + + + Indica un SID que coincide con la cuenta de dominio. + + + Indica un SID que coincide con la cuenta de invitado. + + + Indica un SID que permite a un usuario crear relaciones de confianza de bosque de entrada.Se agrega al símbolo (token) de los usuarios que son miembros del grupo integrado de Creadores de confianza de bosque de entrada en el dominio raíz del bosque. + + + Indica un SID que coincide con el grupo de operadores de red. + + + Indica un SID que coincide con el grupo de usuarios que tiene acceso remoto para supervisar el equipo. + + + Indica un SID que coincide con el grupo de usuarios que tiene acceso remoto para programar un registro de contadores de rendimiento en este equipo. + + + Indica un SID que coincide con el grupo de usuarios avanzados. + + + Indica un SID que coincide con cuentas compatibles con versiones anteriores a Windows 2000. + + + Indica un SID que coincide con el grupo de operadores de impresión. + + + Indica un SID que coincide con usuarios de escritorio remoto. + + + Indica un SID que coincide con la cuenta del replicador. + + + Indica un SID que coincide con el grupo de operadores de sistema. + + + Indica un SID que coincide con las cuentas de usuario integradas. + + + Indica un SID de servidor de grupo de creadores. + + + Indica un SID que coincide con el grupo de creadores de un objeto. + + + Indica un SID de Creator Owner Server. + + + Indica un SID que coincide con el propietario o creador de un objeto. + + + Indica un SID para una cuenta de acceso telefónico. + + + Indica un SID presente cuando el paquete de autenticación implícita de Microsoft autenticó el cliente. + + + Indica un SID para un controlador de empresa. + + + Indica un SID para una cuenta interactiva.Este SID se agrega al proceso de un símbolo (token) cuando inicia sesión interactivamente. + + + Indica un SID que coincide con un servicio local. + + + Indica un SID local. + + + Indica un SID que coincide con el sistema local. + + + Indica un SID que coincide con identificadores de inicio de sesión. + + + Indica el SID máximo definido en la enumeración . + + + Indica un SID que coincide con un servicio de red. + + + Indica un SID para una cuenta de red.Este SID se agrega al proceso de un símbolo (token) cuando inicia sesión a través de una red. + + + Indica un SID para la autoridad de Windows NT. + + + Indica un SID presente cuando el paquete de autenticación NTLM de Microsoft autenticó el cliente. + + + Indica un SID null. + + + Indica un SID presente cuando el usuario se autenticó en un bosque con la opción de autenticación selectiva habilitada.Si este SID está presente, no puede estarlo. + + + Indica un SID de servidor proxy. + + + Indica un SID que coincide con inicios de sesión remotos. + + + Indica un SID para código restringido. + + + Indica un SID presente cuando el paquete de autenticación de canal seguro (SSL/TLS) autenticó el cliente. + + + Indica un SID para sí mismo. + + + Indica un SID para un servicio.Este SID se agrega al proceso de un símbolo (token) cuando inicia sesión como servicio. + + + Indica un SID que coincide con una cuenta de Terminal Server. + + + Indica un SID presente cuando el usuario se autenticó desde el bosque o a través de una confianza que no tiene habilitada la opción de autenticación selectiva.Si este SID está presente, no puede estarlo. + + + Indica un SID que está presente en un servidor que puede emitir licencias de Terminal Server. + + + Indica un SID que coincide con todos. + + + Especifica roles comunes que se van a utilizar con . + + + Los operadores de cuentas administran las cuentas de los usuarios de un equipo o dominio. + + + Los administradores tienen acceso completo y sin restricciones al equipo o dominio. + + + Los operadores de copia de seguridad pueden reemplazar las restricciones de seguridad con el único propósito de hacer copias de seguridad de los archivos o de restaurarlas. + + + Los invitados tienen más restricciones que los usuarios. + + + Los usuarios avanzados poseen la mayoría de los permisos administrativos, con algunas restricciones.De este modo, los usuarios avanzados pueden ejecutar aplicaciones heredadas, además de aplicaciones certificadas. + + + Los operadores de impresión pueden tomar el control de una impresora. + + + Los replicadores permiten la duplicación de archivos en un dominio. + + + Los operadores del sistema administran un equipo en particular. + + + Los usuarios no pueden realizar cambios accidentales o intencionados en todo el sistema.En consecuencia, pueden ejecutar aplicaciones certificadas, pero no la mayoría de las aplicaciones heredadas. + + + Representa un usuario de Windows. + + + Inicializa una nueva instancia de la clase para el usuario representado mediante el token de cuenta de Windows especificado. + Token de cuenta del usuario en cuyo nombre se ejecuta el código. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Inicializa una nueva instancia de la clase para el usuario representado mediante el token de cuenta de Windows y el tipo de autenticación que se hayan especificado. + Token de cuenta del usuario en cuyo nombre se ejecuta el código. + (Uso meramente informativo). Tipo de autenticación usado para identificar al usuario.Para obtener más información, vea la sección Comentarios. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [CRÍTICO PARA LA SEGURIDAD] Obtiene este objeto para esta instancia . + Devuelve un . + + + Libera todos los recursos usados por . + + + Libera los recursos no administrados que usa y libera los recursos administrados de forma opcional. + Es true para liberar tanto recursos administrados como no administrados; es false para liberar únicamente recursos no administrados. + + + Devuelve un objeto que puede usar como valor centinela en el código para representar un usuario anónimo.El valor de la propiedad no representa la identidad anónima integrada que utiliza el sistema operativo Windows. + Objeto que representa a un usuario anónimo. + + + Devuelve un objeto que representa al usuario actual de Windows. + Objeto que representa al usuario actual. + The caller does not have the correct permissions. + + + + + + Devuelve un objeto que representa la identidad de Windows para el subproceso o el proceso, en función del valor del parámetro . + Objeto que representa a un usuario de Windows. + Es true para devolver el objeto , pero solo si el subproceso está realizando la suplantación. Es false para devolver el objeto del subproceso si está realizando la suplantación o el objeto del proceso si el subproceso no está realizando la suplantación. + + + + + + Devuelve un objeto que representa al usuario de Windows actual, usando para ello el nivel de acceso deseado del token que se haya especificado. + Objeto que representa al usuario actual. + Combinación bit a bit de los valores de la enumeración. + + + + + + Obtiene los grupos a los que pertenece el usuario de Windows actual. + Objeto que representa los grupos a los que pertenece el usuario de Windows actual. + + + Obtiene el nivel de suplantación del usuario. + Uno de los valores de la enumeración que especifica el nivel de suplantación. + + + Obtiene un valor que indica si el sistema identifica la cuenta de usuario como cuenta anónima. + true si la cuenta de usuario es anónima; en caso contrario, false. + + + Obtiene un valor que indica si el sistema identifica la cuenta de usuario como cuenta . + true si la cuenta de usuario es una cuenta ; en caso contrario, false. + + + Obtiene un valor que indica si el sistema identifica la cuenta de usuario como cuenta . + true si la cuenta de usuario es una cuenta ; en caso contrario, false. + + + Obtiene el identificador de seguridad (SID) del propietario del token. + Objeto para el propietario del token. + + + Ejecuta la acción especificada como identidad de Windows suplantada.En lugar de usar una llamada al método suplantado y ejecutar la función en , puede usar y proporcionar la función directamente como parámetro. + SafeAccessTokenHandle de la identidad de Windows suplantada. + System.Action que se va a ejecutar. + + + Ejecuta la función especificada como identidad de Windows suplantada.En lugar de usar una llamada al método suplantado y ejecutar la función en , puede usar y proporcionar la función directamente como parámetro. + Devuelve el resultado de la función. + SafeAccessTokenHandle de la identidad de Windows suplantada. + System.Func que se va a ejecutar. + Tipo de objeto usado y devuelto por la función. + + + Obtiene el identificador de seguridad (SID) del usuario. + Objeto para el usuario. + + + Permite que el código compruebe la condición de pertenencia de un usuario de Windows a un grupo de Windows. + + + Inicializa una nueva instancia de la clase usando el objeto especificado. + Objeto a partir del cual se construye una nueva instancia de . + + es null. + + + Determina si la entidad de seguridad actual pertenece al grupo de usuarios de Windows con el identificador relativo (RID) especificado. + true si la entidad de seguridad actual es miembro del grupo de usuarios de Windows especificado, es decir, está en un rol concreto; en caso contrario, false. + RID del grupo de usuarios de Windows en que se comprueba el estado de pertenencia de la entidad de seguridad. + + + + + + Determina si la entidad de seguridad actual pertenece al grupo de usuarios de Windows con el identificador de seguridad (SID) especificado. + Es true si la entidad de seguridad actual es un miembro del grupo de usuarios de Windows especificado; en caso contrario, es false. + + que identifica un grupo de usuarios de Windows de forma única. + + es null. + Windows devolvió un error de Win32. + + + + + + Determina si la entidad de seguridad actual pertenece al grupo de usuarios de Windows con el especificado. + Es true si la entidad de seguridad actual es un miembro del grupo de usuarios de Windows especificado; en caso contrario, es false. + Uno de los valores de . + + no es un valor válido. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/fr/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/fr/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..feeae1e --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/fr/System.Security.Principal.Windows.xml @@ -0,0 +1,735 @@ + + + + System.Security.Principal.Windows + + + + [ESSENTIEL POUR LA SÉCURITÉ] Fournit un handle sécurisé à un thread Windows ou à un jeton d'accès de processus.Pour plus d’informations, consultez Jetons d'accès + + + [ESSENTIEL POUR LA SÉCURITÉ] Initialise une nouvelle instance de la classe . + Objet qui représente le handle préexistant à utiliser.L'utilisation de retourne un handle non valide. + + + [ESSENTIEL POUR LA SÉCURITÉ] Retourne un handle non valide en instanciant un objet avec . + Retourne un objet . + + + [ESSENTIEL POUR LA SÉCURITÉ] Obtient une valeur qui indique si le handle n'est pas valide. + true si le handle n'est pas valide ; sinon false. + + + Représente une exception pour une entité de sécurité dont l'identité n'a pas pu être mappée à une identité connue. + + + Initialise une nouvelle instance de la classe . + + + Initialise une nouvelle instance de la classe en utilisant le message d'erreur spécifié. + Message d'erreur indiquant la raison de l'exception. + + + Initialise une nouvelle instance de la classe en utilisant le message d'erreur et l'exception interne spécifiés. + Message d'erreur indiquant la raison de l'exception. + Exception qui constitue la cause de l'exception actuelle.Si n'est pas null, l'exception en cours est levée dans un bloc catch qui gère l'exception interne. + + + Représente la collection d'identités non mappées pour une exception . + Collection d'identités non mappées. + + + Représente une identité et constitue la classe de base des classes et .Cette classe ne fournit pas de constructeur public, et ne peut donc pas être héritée. + + + Retourne une valeur qui indique si l'objet spécifié équivaut à cette instance de la classe . + true si est un objet avec le même type sous-jacent et la même valeur que cette instance  ; sinon false. + Un objet à comparer avec cette instance ou une référence null. + + + Sert de fonction de hachage pour la . peut être utilisé dans des algorithmes de hachage et des structures de données telles qu'une table de hachage. + Code de hachage de cet objet . + + + Retourne une valeur qui indique si le type spécifié est un type de traduction valide pour la classe . + true si est un type de traduction valide pour la classe  ; sinon false. + Type interrogé quant à sa validité pour servir de conversion de .Les types cibles suivants sont valides : + + + Compare deux objets pour déterminer s'ils sont égaux.Ils sont considérés égaux s'ils ont la même représentation de nom complet que celle retournée par la propriété ou s'ils sont tous les deux null. + true si est égal à  ; sinon, false. + L'opérande gauche à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + L'opérande droit à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + + + Compare deux objets pour déterminer s'ils sont inégaux.Ils ne sont pas considérés égaux si leurs représentations de nom complet sont différentes de celle qui est retournée par la propriété ou si l'un des objets est null et que l'autre ne l'est pas. + true si et ne sont pas égaux ; sinon, false. + L'opérande gauche à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + Opérande droit à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + + + Retourne la représentation sous forme de chaîne de l'identité représentée par l'objet . + L'identité au format de chaîne. + + + Traduit le nom du compte représenté par l'objet dans un autre type dérivé de . + Identité convertie. + Type cible pour la conversion de . + + + Obtient la valeur de chaîne de l'identité représentée par l'objet . + Valeur de chaîne de l'identité représentée par l'objet . + + + Représente une collection d'objets et fournit un mode de conversion des jeux d'objets dérivés de en types dérivés de . + + + Initialise une nouvelle instance de la classe sans aucun élément dans la collection. + + + Initialise une nouvelle instance de la classe en utilisant la taille initiale spécifiée. + Nombre initial d'éléments dans la collection.La valeur de n'est qu'une indication ; il ne s'agit pas nécessairement du nombre maximal d'éléments créés. + + + Ajoute un objet à la collection . + Objet à ajouter à la collection. + + + Efface tous les objets de la collection . + + + Indique si la collection contient l'objet spécifié. + true si la collection contient l'objet spécifié. + Objet à vérifier. + + + Copie la collection dans un tableau , en commençant à l'index spécifié. + Objet tableau dans lequel la collection doit être copiée. + Index de base zéro dans le où la collection doit être copiée. + + + Obtient le nombre d'éléments contenus dans la collection . + Nombre d'objets présents dans la collection . + + + Obtient un énumérateur qui peut être utilisé pour itérer au sein de la collection . + Énumérateur de la collection . + + + Obtient ou définit le nœud à l'index spécifié de la collection . + + à l'index spécifié dans la collection.Si est supérieur ou égal au nombre de nœuds dans la collection, la valeur de retour est null. + Index de base zéro dans la collection . + + + Supprime l'objet spécifié de la collection. + true si l'objet spécifié a été supprimé de la collection. + Objet à supprimer. + + + + Obtient un énumérateur qui peut être utilisé pour itérer au sein de la collection . + Énumérateur de la collection . + + + Convertit les objets de la collection en type spécifié.Appeler cette méthode revient à appeler avec la valeur false affectée au second paramètre, ce qui signifie que les exceptions ne seront pas levées pour les éléments dont la conversion échoue. + Une collection qui représente le contenu converti de la collection d'origine. + Type dans lequel les éléments de la collection sont convertis. + + + + + + Convertit les objets de la collection en type spécifié et utilise la tolérance de panne spécifiée pour gérer ou ignorer des erreurs associées à un type ne disposant pas de mappage de conversion. + Une collection qui représente le contenu converti de la collection d'origine. + Type dans lequel les éléments de la collection sont convertis. + Valeur Boolean déterminant la façon dont les erreurs de conversion sont gérées.Si a la valeur true, les erreurs de conversion dues à un mappage introuvable pour la traduction entraînent l'échec de la conversion et la levée d'exceptions.Si a la valeur false, les types dont la conversion a échoué en raison d'un mappage introuvable pour la traduction sont copiés sans être convertis dans la collection qui est retournée. + + + + + + Représente un utilisateur ou un compte de groupe. + + + Initialise une nouvelle instance de la classe en utilisant le nom spécifié. + Nom utilisé pour créer l'objet .Ce paramètre ne peut pas avoir la valeur null ou être une chaîne vide. + + a la valeur null. + + est une chaîne vide.ou est trop longue. + + + Initialise une nouvelle instance de la classe en utilisant le nom de domaine et le nom de compte spécifiés. + Nom du domaine.Ce paramètre peut avoir la valeur null ou être une chaîne vide.Les noms de domaines qui correspondent à des valeurs null sont traités comme une chaîne vide. + Nom du compte.Ce paramètre ne peut pas avoir la valeur null ou être une chaîne vide. + + a la valeur null. + + est une chaîne vide.ou est trop longue.ou est trop longue. + + + Retourne une valeur indiquant si cet objet équivaut à un objet spécifié. + true si est un objet avec le même type sous-jacent et la même valeur que cet objet  ; sinon false. + Objet à comparer à cet objet ou null. + + + Sert de fonction de hachage à l'objet actif.La méthode peut être utilisée dans des algorithmes de hachage et des structures de données telles qu'une table de hachage. + Valeur de hachage pour l'objet en cours. + + + Retourne une valeur qui indique si le type spécifié est un type de traduction valide pour la classe . + true si est un type de traduction valide pour la classe  ; sinon false. + Type interrogé quant à sa validité pour servir de conversion de .Les types cibles suivants sont valides :- - + + + Compare deux objets pour déterminer s'ils sont égaux.Ils sont considérés égaux s'ils ont la même représentation de nom complet que celle retournée par la propriété ou s'ils sont tous les deux null. + true si est égal à  ; sinon false. + L'opérande gauche à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + L'opérande droit à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + + + Compare deux objets pour déterminer s'ils sont inégaux.Ils ne sont pas considérés égaux si leurs représentations de nom complet sont différentes de celle qui est retournée par la propriété ou si l'un des objets est null et que l'autre ne l'est pas. + true si et ne sont pas égaux ; sinon false. + L'opérande gauche à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + Opérande droit à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + + + Retourne le nom du compte, au format Domaine\Compte, pour le compte représenté par l'objet . + Nom du compte au format Domaine\Compte. + + + Traduit le nom du compte représenté par l'objet dans un autre type dérivé de . + Identité convertie. + Type cible pour la conversion de .Le type cible doit être un type considéré valide par la méthode . + + est null. + + n'est pas un type . + Impossible de traduire certaines ou toutes les références d'identité. + Le nom du compte source est trop long.ouUn code d'erreur Win32 a été retourné. + + + + + + Retourne une représentation sous forme de chaîne en majuscules de cet objet . + Représentation sous forme de chaîne en majuscules de cet objet . + + + + + + Représente un identificateur de sécurité (SID) et fournit des opérations de marshaling et de comparaison des SID. + + + Initialise une nouvelle instance de la classe en utilisant une représentation binaire spécifiée d'un identificateur de sécurité (SID). + Tableau d'octets qui représente le SID. + Offset d'octet à utiliser comme index de départ dans . + + + Initialise une nouvelle instance de la classe en utilisant un entier qui représente la forme binaire d'un identificateur de sécurité (SID). + Entier qui représente la forme binaire d'un SID. + + + Initialise une nouvelle instance de la classe en utilisant le type d'identificateur de sécurité (SID) connu spécifié et le SID du domaine. + Valeur de l'énumération.Cette valeur ne doit pas être . + SID du domaine.Cette valeur est requise pour les valeurs suivantes.Ce paramètre est ignoré pour toutes les autres valeurs .- - - - - - - - - - - - - + + + Initialise une nouvelle instance de la classe en utilisant l'identificateur de sécurité (SID) spécifié au format SDDL (Security Descriptor Definition Language). + Chaîne SDDL pour le SID permettant de créer l'objet . + + + Retourne la partie de l'identificateur de sécurité (SID) du domaine de compte du SID représenté par l'objet si le SID représente un SID de compte Windows.Si le SID ne représente pas un SID de compte Windows, cette propriété retourne . + Partie du SID du domaine de compte du SID représenté par l'objet si le SID représente un SID de compte Windows ; sinon, retourne . + + + Retourne la longueur, en octets, de l'identificateur de sécurité (SID) représenté par l'objet . + Longueur, en octets, du SID représenté par l'objet . + + + Compare l'objet en cours à l'objet spécifié. + Nombre signé indiquant les valeurs relatives de cette instance et .Valeur de retour Description Inférieur à zéro Cette instance est inférieure à . Zéro Cette instance est égale à . Supérieure à zéro Cette instance est supérieure à . + Objet à comparer avec l'objet actif. + + + Retourne une valeur indiquant si cet objet équivaut à un objet spécifié. + true si est un objet avec le même type sous-jacent et la même valeur que cet objet  ; sinon false. + Objet à comparer à cet objet ou null. + + + Indique si l'objet spécifié est égal à l'objet en cours. + true si la valeur de est égale à la valeur de l'objet en cours. + Objet à comparer avec l'objet actif. + + + Copie la représentation binaire de l'identificateur de sécurité (SID) spécifié représenté par la classe dans un tableau d'octets. + Tableau d'octets devant recevoir le SID copié. + Offset d'octet à utiliser comme index de départ dans . + + + Sert de fonction de hachage à l'objet actif.La méthode peut être utilisée dans des algorithmes de hachage et des structures de données telles qu'une table de hachage. + Valeur de hachage pour l'objet actif. + + + Retourne une valeur qui indique si l'identificateur de sécurité (SID) représenté par cet objet est un SID de compte Windows valide. + true si le SID représenté par cet objet est un SID de compte Windows valide ; sinon, false. + + + Retourne une valeur qui indique si l'identificateur de sécurité (SID) représenté par cet objet provient du même domaine que le SID spécifié. + true si le SID représenté par cet objet se trouve dans le même domaine que le SID  ; sinon, false. + SID à comparer à cet objet . + + + Retourne une valeur qui indique si le type spécifié est un type de traduction valide pour la classe . + true si est un type de traduction valide pour la classe  ; sinon false. + Type interrogé quant à sa validité pour servir de conversion de .Les types cibles suivants sont valides :- - + + + Retourne une valeur qui indique si l'objet correspond au type d'identificateur de sécurité (SID) connu spécifié. + true si est le type de SID pour l'objet  ; sinon, false. + Valeur à comparer avec l'objet . + + + Retourne la taille maximale, en octets, de la représentation binaire de l'identificateur de sécurité. + + + Retourne la taille minimale, en octets, de la représentation binaire de l'identificateur de sécurité. + + + Compare deux objets pour déterminer s'ils sont égaux.Ils sont considérés égaux s'ils ont la même représentation canonique que celle retournée par la propriété ou s'ils sont tous les deux null. + true si est égal à  ; sinon, false. + L'opérande gauche à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + L'opérande droit à utiliser pour la comparaison d'égalité.Ce paramètre peut être null. + + + Compare deux objets pour déterminer s'ils sont inégaux.Ils ne sont pas considérés égaux si leurs représentations de nom complet sont différentes de celle qui est retournée par la propriété ou si l'un des objets est null et que l'autre ne l'est pas. + true si et ne sont pas égaux ; sinon, false. + L'opérande gauche à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + Opérande droit à utiliser pour la comparaison d'inégalité.Ce paramètre peut être null. + + + Retourne l'identificateur de sécurité (SID), au format Security Descriptor Definition Language (SDDL), pour le compte représenté par l'objet .S-1-5-9 est un exemple de format SDDL. + SID, au format SDDL, pour le compte représenté par l'objet . + + + Traduit le nom du compte représenté par l'objet dans un autre type dérivé de . + Identité convertie. + Type cible pour la conversion de .Le type cible doit être un type considéré valide par la méthode . + + est null. + + n'est pas un type . + Impossible de traduire certaines ou toutes les références d'identité. + Un code d'erreur Win32 a été retourné. + + + + + + Retourne une chaîne SDDL (Security Descriptor Definition Language) en majuscules pour l'identificateur de sécurité (SID) représenté par cet objet . + Chaîne SDDL en majuscules pour le SID représenté par l'objet . + + + + + + Définit les privilèges du compte d'utilisateur associé au jeton d'accès. + + + L'utilisateur peut modifier le groupe principal, la liste de contrôle d'accès discrétionnaire (DACL) ou le propriétaire par défaut du jeton. + + + L'utilisateur peut modifier les attributs des groupes dans le jeton. + + + L'utilisateur peut activer ou désactiver les privilèges dans le jeton. + + + L'utilisateur peut ajuster l'identificateur de session du jeton. + + + L'utilisateur dispose de tous les accès possibles au jeton. + + + L'utilisateur peut attacher un jeton principal à un processus. + + + L'utilisateur peut dupliquer le jeton. + + + L'utilisateur peut emprunter l'identité d'un client. + + + Valeur maximale pouvant être assignée pour l'énumération . + + + L'utilisateur peut interroger le jeton. + + + L'utilisateur peut interroger la source du jeton. + + + L'utilisateur dispose des droits de lecture standard et du privilège pour le jeton. + + + L'utilisateur dispose des droits d'écriture standard ainsi que des privilèges et pour le jeton. + + + Définit un ensemble d'identificateurs de sécurité (SID) fréquemment utilisés. + + + Indique un SID qui correspond au groupe d'administrateurs de compte. + + + Indique un SID qui correspond au groupe d'administrateurs de certificat. + + + Indique un SID qui correspond au groupe d'ordinateurs de compte. + + + Indique un SID qui correspond au groupe de contrôleurs de compte. + + + Indique un SID qui correspond au groupe d'administrateurs de domaine de compte. + + + Indique un SID qui correspond au groupe d'invités de domaine de compte. + + + Indique un SID qui correspond au groupe d'utilisateurs de domaine de compte. + + + Indique un SID qui correspond au groupe des administrateurs de l'entreprise. + + + Indique un SID qui correspond au groupe d'invités de compte. + + + Indique un SID qui correspond au groupe cible de compte Kerberos. + + + Indique un SID qui correspond au groupe des administrateurs de stratégie. + + + Indique un SID qui correspond au compte de serveur RAS et IAS. + + + Indique un SID qui correspond au groupe d'administrateurs de schéma. + + + Indique un SID pour le compte anonyme. + + + Indique un SID pour un utilisateur authentifié. + + + Indique un SID pour un processus par lots.Ce SID est ajouté au processus d'un jeton lorsqu'il se connecte en tant que tâche batch. + + + Indique un SID qui correspond au compte des opérateurs de compte. + + + Indique un SID qui correspond au compte administrateur. + + + Indique un SID qui correspond au groupe d'accès d'autorisation Windows. + + + Indique un SID qui correspond au groupe des opérateurs de sauvegarde. + + + Indique un SID qui correspond au compte de domaine. + + + Indique un SID qui correspond au compte d'invité. + + + Indique un SID qui permet à un utilisateur de créer des approbations de forêt entrantes.Il est ajouté au jeton des utilisateurs qui sont un membre du groupe prédéfini Générateurs d'approbations de forêt entrante dans le domaine racine de la forêt. + + + Indique un SID qui correspond au groupe des opérateurs de réseau. + + + Indique un SID qui correspond au groupe d'utilisateurs disposant d'un accès à distance qui permet de surveiller l'ordinateur. + + + Indique un SID qui correspond au groupe d'utilisateurs disposant d'un accès à distance qui permet de planifier la journalisation des compteurs de performance sur cet ordinateur. + + + Indique un SID qui correspond au groupe des utilisateurs avec pouvoir. + + + Indique un SID qui correspond aux comptes compatibles avec les versions antérieures à Windows 2000. + + + Indique un SID qui correspond au groupe des opérateurs d'impression. + + + Indique un SID qui correspond aux utilisateurs du bureau à distance. + + + Indique un SID qui correspond au compte du réplicateur. + + + Indique un SID qui correspond au groupe des opérateurs système. + + + Indique un SID qui correspond aux comptes d'utilisateurs intégrés. + + + Indique un SID de Creator Group Server. + + + Indique un SID qui correspond au groupe créateur d'un objet. + + + Indique un SID de Creator Owner Server. + + + Indique un SID qui correspond au propriétaire ou au créateur d'un objet. + + + Indique un SID pour un compte d'accès à distance. + + + Indique un SID présent lorsque le package d'authentification Microsoft Digest a authentifié le client. + + + Indique un SID pour un contrôleur d'entreprise. + + + Indique un SID pour un compte interactif.Ce SID est ajouté au processus d'un jeton lorsqu'il se connecte de manière interactive. + + + Indique un SID qui correspond à un service local. + + + Indique un SID local. + + + Indique un SID qui correspond au système local. + + + Indique un SID qui correspond aux ID de connexion. + + + Indique le SID maximal défini dans l'énumération . + + + Indique un SID qui correspond à un service réseau. + + + Indique un SID pour un compte réseau.Ce SID est ajouté au processus d'un jeton lorsqu'il se connecte sur un réseau. + + + Indique un SID pour l'autorité Windows NT. + + + Indique un SID présent lorsque le package d'authentification Microsoft NTLM a authentifié le client. + + + Indique un SID null. + + + Indique un SID présent lorsque l'utilisateur s'est authentifié sur une forêt avec l'option d'authentification sélective activée.Si ce SID est présent, ne peut pas être présent. + + + Indique un SID de proxy. + + + Indique un SID qui correspond aux connexions à distance. + + + Indique un SID pour du code restreint. + + + Indique un SID présent lorsque le package d'authentification de canal sécurisé (SSL/TLS) a authentifié le client. + + + Indique un SID pour soi-même. + + + Indique un SID pour un service.Ce SID est ajouté au processus d'un jeton lorsqu'il se connecte en tant que service. + + + Indique un SID qui correspond à un compte de serveur Terminal Server. + + + Indique un SID présent lorsque l'utilisateur s'est authentifié depuis la forêt ou sur une approbation pour laquelle l'option d'authentification sélective n'est pas activée.Si ce SID est présent, ne peut pas être présent. + + + Indique un SID présent dans un serveur qui peut délivrer des licences Terminal Server. + + + Indique un SID qui correspond à tous. + + + Spécifie les rôles communs à utiliser avec . + + + Les opérateurs de compte gèrent les comptes d'utilisateurs sur un ordinateur ou un domaine. + + + Les administrateurs ont un accès total et illimité à l'ordinateur ou au domaine. + + + Les opérateurs de sauvegarde peuvent substituer des restrictions de sécurité dans le but unique de sauvegarder ou restaurer des fichiers. + + + Les invités sont plus limités que les utilisateurs. + + + Les utilisateurs avec pouvoir possèdent la plupart des autorisations administratives avec quelques restrictions.Ainsi, les utilisateurs avec pouvoirs peuvent exécuter des applications héritées (legacy), en plus des applications certifiées. + + + Les opérateurs d'impression peuvent prendre le contrôle d'une imprimante. + + + Les réplicateurs prennent en charge la réplication des fichiers dans un domaine. + + + Un opérateur système gère un ordinateur particulier. + + + Les utilisateurs ne peuvent pas effectuer des modifications accidentelles ou intentionnelles à l'échelle du système.Ainsi, les utilisateurs peuvent exécuter des applications certifiées, mais pas la plupart des applications héritées (legacy). + + + Représente un utilisateur Windows. + + + Initialise une nouvelle instance de la classe pour l'utilisateur représenté par le jeton de compte Windows spécifié. + Jeton de compte pour l'utilisateur au nom duquel le code est en cours d'exécution. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Initialise une nouvelle instance de la classe pour l'utilisateur représenté par le jeton de compte Windows et le type d'authentification spécifiés. + Jeton de compte pour l'utilisateur au nom duquel le code est en cours d'exécution. + (Utilisation à titre informatif uniquement.) Type d'authentification utilisé pour identifier l'utilisateur.Pour plus d'informations, consultez la section Notes. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [ESSENTIEL POUR LA SÉCURITÉ] Obtient ce pour cette instance de . + Retourne . + + + Libère toutes les ressources utilisées par . + + + Libère les ressources non managées utilisées par l'objet et libère éventuellement les ressources managées. + true pour libérer les ressources managées et non managées ; false pour ne libérer que les ressources non managées. + + + Retourne un objet que vous pouvez utiliser comme valeur de sentinelle dans votre code pour représenter un utilisateur anonyme.La valeur de propriété ne représente pas l'identité anonyme prédéfinie utilisée par le système d'exploitation Windows. + Objet qui représente un utilisateur anonyme. + + + Retourne un objet qui représente l'utilisateur Windows actuel. + Objet qui représente l'utilisateur actuel. + The caller does not have the correct permissions. + + + + + + Retourne un objet représentant l'identité Windows pour le thread ou le processus, selon la valeur du paramètre . + Objet qui représente un utilisateur Windows. + true pour retourner uniquement si le thread emprunte actuellement une identité ; false pour retourner le du thread s'il emprunte une identité ou le du processus si le thread n'emprunte pas actuellement d'identité. + + + + + + Retourne un objet qui représente l'utilisateur Windows actuel, en utilisant le niveau d'accès du jeton souhaité spécifié. + Objet qui représente l'utilisateur actuel. + Combinaison d'opérations de bits des valeurs d'énumération. + + + + + + Obtient les groupes auxquels l'utilisateur Windows actuel appartient. + Objet qui représente les groupes auxquels l'utilisateur Windows actuel appartient. + + + Obtient le niveau d'emprunt d'identité pour l'utilisateur. + Une des valeurs d'énumération qui spécifie le niveau d'emprunt d'identité. + + + Obtient une valeur qui indique si le compte d'utilisateur est identifié en tant que compte anonyme par le système. + true si le compte d'utilisateur est un compte anonyme ; sinon, false. + + + Obtient une valeur indiquant si le compte d'utilisateur est identifié en tant que compte par le système. + true si le compte d'utilisateur est un compte  ; sinon, false. + + + Obtient une valeur indiquant si le compte d'utilisateur est identifié en tant que compte par le système. + true si le compte d'utilisateur est un compte  ; sinon, false. + + + Obtient l'identificateur de sécurité (SID) pour le propriétaire du jeton. + Objet pour le propriétaire du jeton. + + + Exécute l'action spécifiée en tant qu'identité Windows empruntée.Au lieu d'utiliser un appel de méthode emprunté et d'exécuter votre fonction dans , vous pouvez utiliser et fournir votre fonction directement en tant que paramètre. + SafeAccessTokenHandle de l'identité Windows empruntée. + System.Action à exécuter. + + + Exécute la fonction spécifiée en tant qu'identité Windows empruntée.Au lieu d'utiliser un appel de méthode emprunté et d'exécuter votre fonction dans , vous pouvez utiliser et fournir votre fonction directement en tant que paramètre. + Retourne le résultat de la fonction. + SafeAccessTokenHandle de l'identité Windows empruntée. + System.Func à exécuter. + Type d'objet utilisé et retourné par la fonction. + + + Obtient l'identificateur de sécurité (SID) pour l'utilisateur. + Objet pour l'utilisateur. + + + Permet au code de vérifier l'appartenance à un groupe Windows d'un utilisateur Windows. + + + Initialise une nouvelle instance de la classe à l'aide de l'objet spécifié. + Objet à partir duquel la nouvelle instance de doit être créée. + + a la valeur null. + + + Détermine si l'objet Principal actuel appartient au groupe d'utilisateurs Windows avec l'identificateur relatif (RID, Relative Identifier) spécifié. + true si l'entité de sécurité actuelle est membre du groupe d'utilisateurs Windows spécifié, autrement dit s'il appartient à un rôle particulier ; sinon, false. + RID du groupe d'utilisateurs Windows dans lequel rechercher l'état d'appartenance de l'objet Principal. + + + + + + Détermine si l'objet Principal actuel appartient au groupe d'utilisateurs Windows avec l'identificateur de sécurité (SID) spécifié. + true si l'objet Principal actuel est membre du groupe d'utilisateurs Windows spécifié ; sinon, false. + + qui identifie de manière unique un groupe d'utilisateurs Windows. + + a la valeur null. + Windows a retourné une erreur Win32. + + + + + + Détermine si l'objet Principal actuel appartient au groupe d'utilisateurs Windows avec le spécifié. + true si l'objet Principal actuel est membre du groupe d'utilisateurs Windows spécifié ; sinon, false. + Une des valeurs de . + + n'est pas une valeur valide. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/it/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/it/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..f088015 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/it/System.Security.Principal.Windows.xml @@ -0,0 +1,733 @@ + + + + System.Security.Principal.Windows + + + + [SecurityCritical] Fornisce un handle sicuro a un token di accesso di thread o processo di Windows.Per altre informazioni, vedere la pagina relativa ai token di accesso. + + + [SecurityCritical] Inizializza una nuova istanza della classe . + Oggetto che rappresenta l'handle preesistente da usare.Se si usa , viene restituito un handle non valido. + + + [SecurityCritical] Restituisce un handle non valido creando un'istanza di un oggetto con . + Restituisce un oggetto . + + + [SecurityCritical] Ottiene un valore che indica se l'handle non è valido. + true se l'handle non è valido; in caso contrario, false. + + + Rappresenta un'eccezione per un'entità per la quale non è stato possibile eseguire il mapping dell'identità con un'identità nota. + + + Inizializza una nuova istanza della classe . + + + Inizializza una nuova istanza della classe utilizzando il messaggio di errore specificato. + Messaggio di errore nel quale viene indicato il motivo dell’eccezione + + + Inizializza una nuova istanza della classe tramite il messaggio di errore e l'eccezione interna specificati. + Messaggio di errore nel quale viene indicato il motivo dell’eccezione + Eccezione causa dell'eccezione corrente.Se non è null, l'eccezione corrente viene generata in un blocco catch che gestisce l'eccezione interna. + + + Rappresenta l'insieme delle identità senza mapping per un'eccezione . + Insieme delle identità senza mapping. + + + Rappresenta un'identità ed è la classe base delle classi e .Questa class non fornisce un costruttore pubblico e di conseguenza non può essere ereditata. + + + Restituisce un valore che indica se l'oggetto specificato è uguale all'istanza corrente della classe . + true se è un oggetto con lo stesso tipo sottostante e valore di questa istanza di ; in caso contrario false. + Oggetto da confrontare con l'istanza di corrente o riferimento null. + + + Viene utilizzato come funzione hash per . può essere utilizzato in algoritmi di hash e strutture di dati, ad esempio una tabella hash. + Codice hash per questo oggetto . + + + Restituisce un valore che indica se il tipo specificato è un tipo di conversione valido per la classe . + true se è un tipo di conversione valido per la classe ; in caso contrariofalse. + Tipo di cui viene verificata la validità per la conversione da .I seguenti tipi di destinazione sono validi: + + + Confronta due oggetti per determinarne l'uguaglianza.I due oggetti vengono considerati uguali se la loro rappresentazione del nome canonico corrisponde a quella restituita dalla proprietà o se sono entrambi null. + true se e sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + + + Confronta due oggetti per determinarne la disuguaglianza.I due oggetti non vengono considerati uguali se hanno rappresentazioni del nome canonico diverse da quella restituita dalla proprietà o se solo uno degli oggetti è null. + true se e non sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + + + Restituisce la rappresentazione di stringa dell'identità rappresentata dall'oggetto . + Identità in formato stringa. + + + Converte il nome di account rappresentato dall'oggetto in un altro tipo derivato da . + Identità convertita. + Tipo di destinazione per la conversione da . + + + Ottiene il valore stringa dell'identità rappresentata dall'oggetto . + Valore stringa dell'identità rappresentata dall'oggetto . + + + Rappresenta una raccolta di oggetti e fornisce una soluzione per convertire gruppi di oggetti derivati da in tipi derivati da . + + + Inizializza una nuova istanza della classe con zero elementi nella raccolta. + + + Inizializza una nuova istanza della classe usando la dimensione iniziale specificata. + Numero iniziale di elementi contenuti nella raccolta.Il valore di è soltanto un'indicazione e non è necessariamente il numero massimo di elementi creati. + + + Aggiunge un oggetto alla raccolta . + Oggetto da aggiungere alla raccolta. + + + Cancella tutti gli oggetti dalla raccolta . + + + Indica se la raccolta contiene l'oggetto specificato. + true se la raccolta contiene l'oggetto specificato. + Oggetto da verificare. + + + Copia la raccolta in una matrice , a partire dall'indice specificato. + Oggetto di una matrice in cui copiare la raccolta . + Indice in base zero nel parametro in cui viene copiata la raccolta . + + + Ottiene il numero di elementi nella raccolta . + Numero di oggetti nella raccolta . + + + Ottiene un enumeratore che può essere usato per eseguire l'iterazione nella raccolta . + Enumeratore per la raccolta . + + + Ottiene o imposta il nodo in corrispondenza dell'indice specificato dalla raccolta . + Oggetto della raccolta in corrispondenza dell'indice specificato.Se è maggiore o uguale al numero di nodi della raccolta, il valore restituito è null. + Indice in base zero della raccolta . + + + Rimuove l'oggetto specificato dalla raccolta. + true se l'oggetto specificato è stato rimosso dalla raccolta. + Oggetto da rimuovere. + + + + Ottiene un enumeratore che può essere usato per eseguire l'iterazione nella raccolta . + Enumeratore per la raccolta . + + + Converte gli oggetti nella raccolta nel tipo specificato.La chiamata a questo metodo equivale a chiamare con il secondo parametro impostato su false, per indicare che non verranno generate eccezioni per gli elementi la cui conversione non riesce. + Raccolta che rappresenta il contenuto convertito della raccolta originale. + Tipo in cui vengono convertiti gli elementi della raccolta. + + + + + + Converte gli oggetti della raccolta nel tipo specificato e usa la tolleranza di errore specificata per gestire o ignorare gli errori associati a un tipo senza un mapping di conversione. + Raccolta che rappresenta il contenuto convertito della raccolta originale. + Tipo in cui vengono convertiti gli elementi della raccolta. + Valore booleano che determina come vengono gestiti gli errori di conversione.Se è true, gli errori di conversione causati dalla mancanza di un mapping per la traduzione impediscono la riuscita della conversione e generano eccezioni.Se è false, i tipi che non sono stati convertiti per la mancanza di un mapping per la traduzione vengono copiati senza essere convertiti nella raccolta restituita. + + + + + + Rappresenta un account utente o gruppo. + + + Inizializza una nuova istanza della classe tramite il nome specificato. + Nome utilizzato per creare l'oggetto .Questo parametro non può essere null o una stringa vuota. + + è null. + + è una stringa vuota.- oppure - è troppo lungo. + + + Inizializza una nuova istanza della classe tramite il nome di dominio e di account specificati. + Nome del dominio.Questo parametro può essere null o una stringa vuota.I nomi di dominio con valore null vengono trattati come stringhe vuote. + Nome dell'account.Questo parametro non può essere null o una stringa vuota. + + è null. + + è una stringa vuota.- oppure - è troppo lungo.- oppure - è troppo lungo. + + + Restituisce un valore che indica se l'oggetto corrente è uguale a un oggetto specificato. + true se è un oggetto con lo stesso tipo sottostante e valore di questo oggetto ; in caso contrario false. + Oggetto da confrontare con questo oggetto o null. + + + Viene utilizzato come funzione hash per l'oggetto corrente .Il metodo è adatto per apporre un numero hash agli algoritmi e alle strutture dei dati, ad esempio una tabella hash. + Valore hash per l'oggetto corrente . + + + Restituisce un valore che indica se il tipo specificato è un tipo di conversione valido per la classe . + true se è un tipo di conversione valido per la classe ; in caso contrariofalse. + Tipo di cui viene verificata la validità per la conversione da .I seguenti tipi di destinazione sono validi:- - + + + Confronta due oggetti per determinarne l'uguaglianza.I due oggetti vengono considerati uguali se la loro rappresentazione del nome canonico corrisponde a quella restituita dalla proprietà o se sono entrambi null. + true se e sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + + + Confronta due oggetti per determinarne la disuguaglianza.I due oggetti non vengono considerati uguali se hanno rappresentazioni del nome canonico diverse da quella restituita dalla proprietà o se solo uno degli oggetti è null. + true se e non sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + + + Restituisce il nome in formato Dominio\Account dell'account rappresentato dall'oggetto . + Nome dell'account in formato Dominio\Account. + + + Converte il nome di account rappresentato dall'oggetto in un altro tipo derivato da . + Identità convertita. + Tipo di destinazione per la conversione da .Il tipo di destinazione deve essere un tipo considerato valido dal metodo . + + è null. + + non è un tipo . + Impossibile convertire parte e o tutti i riferimenti di identità. + Il nome dell'account di origine è troppo lungo.- oppure -È stato restituito un codice di errore Win32. + + + + + + Restituisce una rappresentazione sotto forma di stringa in caratteri maiuscoli dell'oggetto corrente. + Rappresentazione sotto forma di stringa in caratteri maiuscoli dell'oggetto corrente. + + + + + + Rappresenta un identificatore di sicurezza (SID) e fornisce le operazioni di marshalling e confronto per i SID. + + + Inizializza una nuova istanza della classe tramite una rappresentazione binaria specificata di un SID. + Matrice di byte che rappresenta il SID. + Offset di byte da utilizzare come indice iniziale in . + + + Inizializza una nuova istanza della classe tramite un intero che rappresenta il formato binario di un identificatore di sicurezza (SID). + Intero che rappresenta il formato binario di un identificatore di sicurezza (SID). + + + Inizializza una nuova istanza della classe tramite il tipo di SID noto specificato e il SID del dominio. + Uno dei valori dell'enumerazione.Questo valore deve essere diverso da . + SID del dominio.Questo valore è obbligatorio per i valori seguenti di .Questo parametro viene ignorato se contiene qualsiasi altro valore .- - - - - - - - - - - - - + + + Inizializza una nuova istanza della classe utilizzando il SID specificato in formato SDDL (Security Descriptor Definition Language). + Stringa SDDL relativa al SID utilizzato per creare l'oggetto . + + + Restituisce la parte del SID del dominio degli account dal SID rappresentato dall'oggetto se il SID rappresenta un SID di account Windows.Se il SID non rappresenta un SID di account Windows, questa proprietà restituisce . + La parte del SID del dominio degli account rappresentato dall'oggetto se il SID rappresenta un SID di account Windows; in caso contrario, restituisce . + + + Restituisce la lunghezza in byte del SID rappresentato dall'oggetto . + Lunghezza in byte del SID rappresentato dall'oggetto . + + + Confronta l'oggetto corrente con l'oggetto specificato. + Numero con segno che indica i valori relativi di questa istanza e di .Valore restituito Descrizione Minore di zero Questa istanza è minore di . Zero Questa istanza è uguale al parametro . Maggiore di zero L'istanza è maggiore di . + Oggetto da confrontare con l'oggetto corrente. + + + Restituisce un valore che indica se l'oggetto corrente è uguale a un oggetto specificato. + true se è un oggetto con lo stesso tipo sottostante e valore di questo oggetto ; in caso contrario false. + Oggetto da confrontare con questo oggetto o null. + + + Indica se l'oggetto specificato è uguale all'oggetto corrente. + true se il valore di è uguale al valore dell'oggetto corrente. + Oggetto da confrontare con l'oggetto corrente. + + + Copia la rappresentazione binaria del SID specificato rappresentato dalla classe in una matrice di byte. + Matrice di byte che riceverà il SID copiato. + Offset di byte da utilizzare come indice iniziale in . + + + Viene utilizzato come funzione hash per l'oggetto corrente .Il metodo è adatto per apporre un numero hash agli algoritmi e alle strutture dei dati, ad esempio una tabella hash. + Valore hash per l'oggetto corrente . + + + Restituisce un valore che indica se il SID rappresentato da questo oggetto è un SID di account Windows valido. + true se il SID rappresentato da questo oggetto è un SID di account Windows valido; in caso contrario, false. + + + Restituisce un valore che indica se il SID rappresentato da questo oggetto appartiene allo stesso dominio del SID specificato. + true se il SID rappresentato da questo oggetto appartiene allo stesso dominio del SID ; in caso contrario, false. + SID da confrontare con questo oggetto . + + + Restituisce un valore che indica se il tipo specificato è un tipo di conversione valido per la classe . + true se è un tipo di conversione valido per la classe ; in caso contrariofalse. + Tipo di cui viene verificata la validità per la conversione da .I seguenti tipi di destinazione sono validi:- - + + + Restituisce un valore che indica se l'oggetto corrisponde al tipo del SID noto specificato. + true se è il tipo di SID dell'oggetto ; in caso contrario, false. + Valore da confrontare con l'oggetto . + + + Restituisce la dimensione massima in byte della rappresentazione binaria del SID. + + + Restituisce la dimensione minima in byte della rappresentazione binaria del SID. + + + Confronta due oggetti per determinarne l'uguaglianza.I due oggetti vengono considerati uguali se la loro rappresentazione del nome canonico corrisponde con quella restituita dalla proprietà o se sono entrambi null. + true se e sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di uguaglianza.Questo parametro può essere null. + + + Confronta due oggetti per determinarne la disuguaglianza.I due oggetti non vengono considerati uguali se hanno rappresentazioni del nome canonico diverse da quella restituita dalla proprietà o se solo uno degli oggetti è null. + true se e non sono uguali; in caso contrario, false. + Operando di sinistra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + Operando di destra da utilizzare per il confronto di disuguaglianza.Questo parametro può essere null. + + + Restituisce il SID, in formato SDDL, per l'account rappresentato dall'oggetto .Esempio di formato SDDL: S-1-5-9. + SID in formato SDDL per l'account rappresentato dall'oggetto . + + + Converte il nome di account rappresentato dall'oggetto in un altro tipo derivato da . + Identità convertita. + Tipo di destinazione per la conversione da .Il tipo di destinazione deve essere un tipo considerato valido dal metodo . + + è null. + + non è un tipo . + Impossibile convertire parte e o tutti i riferimenti di identità. + È stato restituito un codice di errore Win32. + + + + + + Restituisce una stringa SDDL (Security Descriptor Definition Language) in caratteri maiuscoli per il SID rappresentato da questo oggetto . + Stringa SDDL in caratteri maiuscoli per il SID rappresentato dall'oggetto . + + + + + + Definisce i privilegi dell'account utente associato al token di accesso. + + + L'utente può modificare il proprietario predefinito, il gruppo primario o l'elenco di controllo di accesso discrezionale (DACL) del token. + + + L'utente può modificare gli attributi dei gruppi nel token. + + + L'utente può attivare o disabilitare i privilegi nel token. + + + L'utente può modificare l'identificatore di sessione del token. + + + L'utente dispone di qualsiasi tipo di accesso possibile al token. + + + L'utente può associare un token primario a un processo. + + + L'utente può duplicare il token. + + + L'utente può rappresentare un client. + + + Il valore massimo che è possibile assegnare per l'enumerazione . + + + L'utente può eseguire query nel token. + + + L'utente può eseguire query nell'origine del token. + + + L'utente dispone di diritti di lettura standard e del privilegio per il token. + + + L'utente dispone di diritti di scrittura standard e dei privilegi e per il token. + + + Definisce un insieme di SID comunemente utilizzati. + + + Indica un SID che corrisponde al gruppo degli amministratori degli account. + + + Indica un SID che corrisponde al gruppo degli amministratori dei certificati. + + + Indica un SID che corrisponde al gruppo di computer degli account. + + + Indica un SID che corrisponde al gruppo di controller degli account. + + + Indica un SID che corrisponde al gruppo degli amministratori del dominio degli account. + + + Indica un SID che corrisponde al gruppo dei guest del dominio degli account. + + + Indica un SID che corrisponde al gruppo degli utenti del dominio degli account. + + + Indica un SID che corrisponde al gruppo degli amministratori dell'organizzazione. + + + Indica un SID che corrisponde al gruppo dei guest degli account. + + + Indica un SID che corrisponde al gruppo di destinazione Kerberos degli account. + + + Indica un SID che corrisponde al gruppo degli amministratori dei criteri. + + + Indica un SID che corrisponde all'account server RAS e IAS. + + + Indica un SID che corrisponde al gruppo degli amministratori dello schema. + + + Indica un SID per l'account anonimo. + + + Indica un SID per un utente autenticato. + + + Indica un SID per un processo batch.Questo SID viene aggiunto al processo di un token quando si connette come processo per batch. + + + Indica un SID che corrisponde all'account Account Operators. + + + Indica un SID che corrisponde all'account dell'amministratore. + + + Indica un SID che corrisponde al gruppo di accesso autorizzazione Windows. + + + Indica un SID che corrisponde al gruppo Backup Operators. + + + Indica un SID che corrisponde all'account di dominio. + + + Indica un SID che corrisponde all'account guest. + + + Indica un SID che consente all'utente di creare trust tra insiemi di strutture in ingresso.Viene aggiunto al token degli utenti membri del gruppo predefinito Incoming Forest Trust Builders nel dominio radice dell'insieme di strutture. + + + Indica un SID che corrisponde al gruppo degli operatori di rete. + + + Indica un SID che corrisponde al gruppo degli utenti ai quali è consentito l'accesso remoto per monitorare il computer. + + + Indica un SID che corrisponde al gruppo degli utenti ai quali è consentito l'accesso remoto per pianificare la registrazione dei contatori di prestazioni sul computer. + + + Indica un SID che corrisponde al gruppo Power Users. + + + Indica un SID che corrisponde agli account compatibili con versioni precedenti a Windows 2000. + + + Indica un SID che corrisponde al gruppo Print Operators. + + + Indica un SID che corrisponde al gruppo Utenti desktop remoto. + + + Indica un SID che corrisponde all'account Replicator. + + + Indica un SID che corrisponde al gruppo System Operators. + + + Indica un SID che corrisponde agli account utente predefiniti. + + + Indica un SID server Gruppo creatore. + + + Indica un SID che corrisponde al Gruppo creatore di un oggetto. + + + Indica un SID server Creator Owner. + + + Indica un SID che corrisponde al proprietario o al creatore di un oggetto. + + + Indica un SID per un account di accesso remoto. + + + Indica un SID presente quando il pacchetto di autenticazione digest Microsoft ha autenticato il client. + + + Indica un SID per un controller dell'organizzazione. + + + Indica un SID per un account interattivo.Questo SID viene aggiunto al processo di un token quando si connette in modo interattivo. + + + Indica un SID che corrisponde a un servizio locale. + + + Indica un SID locale. + + + Indica un SID che corrisponde al sistema locale. + + + Indica un SID che corrisponde agli ID di accesso. + + + Indica il SID massimo definito nell'enumerazione . + + + Indica un SID che corrisponde a un servizio di rete. + + + Indica un SID per un account di rete.Questo SID viene aggiunto al processo di un token quando si connette tramite una rete. + + + Indica un SID per l'autorità di Windows NT. + + + Indica un SID presente quando il pacchetto di autenticazione NTLM Microsoft ha autenticato il client. + + + Indica un SID null. + + + Indica un SID presente quando l'utente è stato autenticato in un insieme di strutture con l'opzione di autenticazione selettiva attivata.Se questo SID è presente, non può essere presente. + + + Indica un SID proxy. + + + Indica un SID che corrisponde ad accessi remoti. + + + Indica un SID per il codice con restrizioni. + + + Indica un SID presente quando il pacchetto di autenticazione a canale protetto (SSL/TLS) ha autenticato il client. + + + Indica un SID per l'oggetto corrente. + + + Indica un SID per un servizio.Questo SID viene aggiunto al processo di un token quando si connette come servizio. + + + Indica un SID che corrisponde a un account di Terminal Server. + + + Indica un SID presente quando l'utente è stato autenticato dall'interno dell'insieme di strutture o tramite un trust in cui l'opzione di autenticazione selettiva non è attivata.Se questo SID è presente, non può essere presente. + + + Indica un SID presente in un server che può rilasciare licenze di Terminal Server. + + + Indica un SID che corrisponde a tutti. + + + Specifica i ruoli comuni da utilizzare con . + + + Gli operatori di account gestiscono gli account utente su un computer o dominio. + + + Gli utenti del gruppo Administrators hanno accesso completo e senza restrizioni al computer o dominio. + + + Al gruppo Backup operators è consentito ignorare le restrizioni di sicurezza per l'esecuzione delle sole operazioni di backup e ripristino di file. + + + Il gruppo Guests è vincolato da maggiori restrizioni rispetto al gruppo Users. + + + Gli utenti esperti dispongono di quasi tutte le autorizzazioni amministrative con alcune restrizioni eGli utenti del gruppo Power users possono perciò eseguire applicazioni legacy, oltre ad applicazioni certificate. + + + Gli operatori di stampa possono controllare una stampante. + + + Il gruppo Replicators supporta la replica di file in un dominio. + + + Il gruppo System operators gestisce un computer specifico. + + + Gli utenti possono eseguire le applicazioni certificate, ma non quelle legacy,Gli utenti di questo gruppo, pertanto, possono eseguire applicazioni certificate, ma non la maggior parte delle applicazioni legacy. + + + Rappresenta un utente Windows. + + + Inizializza una nuova istanza della classe per l'utente rappresentato dal token di account Windows specificato. + Token di account dell'utente per conto del quale è in esecuzione il codice. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Inizializza una nuova istanza della classe per l'utente rappresentato dal token di account Windows e dal tipo di autenticazione specificati. + Token di account dell'utente per conto del quale è in esecuzione il codice. + (Uso puramente informativo). Tipo di autenticazione usata per identificare l'utente.Per altre informazioni, vedere la sezione Note. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [SecurityCritical] Ottiene l'oggetto per questa istanza di . + Restituisce un valore . + + + Rilascia tutte le risorse usate dall'oggetto . + + + Rilascia le risorse non gestite usate da e, facoltativamente, le risorse gestite. + true per rilasciare sia le risorse gestite sia quelle non gestite; false per rilasciare solo le risorse non gestite. + + + Restituisce un oggetto che è possibile usare nel codice come valore di sentinel per rappresentare un utente anonimo.Il valore della proprietà non rappresenta l'identità anonima predefinita usata dal sistema operativo Windows. + Oggetto che rappresenta un utente anonimo. + + + Restituisce un oggetto che rappresenta l'utente Windows corrente. + Oggetto che rappresenta l'utente corrente. + The caller does not have the correct permissions. + + + + + + Restituisce un oggetto che rappresenta l'identità Windows del thread o del processo, a seconda del valore del parametro . + Oggetto che rappresenta un utente Windows. + true per la restituzione dell'oggetto solo se il thread è attualmente una rappresentazione; false per la restituzione dell'oggetto del thread se è una rappresentazione o dell'oggetto del processo se il thread non è attualmente una rappresentazione. + + + + + + Restituisce un oggetto che rappresenta l'utente Windows corrente, usando il livello di accesso del token specificato. + Oggetto che rappresenta l'utente corrente. + Combinazione bit per bit dei valori di enumerazione. + + + + + + Ottiene i gruppi ai quali appartiene l'utente Windows corrente. + Oggetto che rappresenta i gruppi ai quali appartiene l'utente Windows corrente. + + + Ottiene il livello di rappresentazione dell'utente. + Uno dei valori di enumerazione che specifica il livello di rappresentazione. + + + Ottiene un valore che indica se l'account utente è identificato dal sistema come account anonimo. + true se l'account utente è un account anonimo; in caso contrario, false. + + + Ottiene un valore che indica se l'account utente è identificato dal sistema come account . + true se l'account utente è un account ; in caso contrario, false. + + + Ottiene un valore che indica se l'account utente è identificato dal sistema come account . + true se l'account utente è un account ; in caso contrario, false. + + + Ottiene l'ID di sicurezza (SID) del proprietario del token. + Oggetto del proprietario del token. + + + Esegue l'azione specificata come identità Windows rappresentata.Anziché usare una chiamata al metodo rappresentato ed eseguire la funzione in , è possibile usare e fornire la funzione direttamente come parametro. + Oggetto SafeAccessTokenHandle dell'identità Windows rappresentata. + System.Action da eseguire. + + + Esegue la funzione specificata come identità Windows rappresentata.Anziché usare una chiamata al metodo rappresentato ed eseguire la funzione in , è possibile usare e fornire la funzione direttamente come parametro. + Restituisce il risultato della funzione. + Oggetto SafeAccessTokenHandle dell'identità Windows rappresentata. + System.Func da eseguire. + Tipo di oggetto usato e restituito dalla funzione. + + + Ottiene l'ID di sicurezza (SID) dell'utente. + Oggetto dell'utente. + + + Consente al codice di verificare se un utente Windows appartiene a un gruppo Windows. + + + Inizializza una nuova istanza della classe utilizzando l'oggetto specificato. + Oggetto da cui costruire la nuova istanza di . + + è null. + + + Determina se l'oggetto Principal corrente appartiene al gruppo di utenti Windows con l'identificatore relativo (RID) specificato. + true se l'entità corrente è un membro del gruppo di utenti Windows specificato, ossia, è assegnato a un ruolo specifico; in caso contrario, false. + RID del gruppo di utenti Windows nel quale controllare lo stato di appartenenza dell'oggetto Principal. + + + + + + Determina se l'entità corrente appartiene al gruppo di utenti Windows con l'identificatore di sicurezza (SID) specificato. + true se l'oggetto Principal corrente è un membro del gruppo di utenti Windows specificato; in caso contrario, false. + Oggetto che identifica in modo univoco un gruppo di utenti Windows. + + è null. + Windows ha restituito un errore Win32. + + + + + + Determina se l'entità corrente appartiene al gruppo di utenti Windows con il nome specificato . + true se l'oggetto Principal corrente è un membro del gruppo di utenti Windows specificato; in caso contrario, false. + Uno dei valori di . + + non è un valore valido. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ja/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ja/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..ed5fd32 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ja/System.Security.Principal.Windows.xml @@ -0,0 +1,798 @@ + + + + System.Security.Principal.Windows + + + + [セキュリティ クリティカル] Windows のスレッドまたはプロセスのアクセス トークンにセーフ ハンドルを提供します。詳細については、「アクセス トークン」を参照してください。 + + + [セキュリティ クリティカル] クラスの新しいインスタンスを初期化します。 + 使用する既存のハンドルを表す オブジェクト。 を使用して無効なハンドルを返します。 + + + [セキュリティ クリティカル] オブジェクトを でインスタンス化して、無効なハンドルを返します。 + + オブジェクトを返します。 + + + [セキュリティ クリティカル] ハンドルが無効かどうかを示す値を取得します。 + ハンドルが無効な場合は true。それ以外の場合は false。 + + + ID を既知の ID に割り当てることができないプリンシパルの例外を表します。 + + + + クラスの新しいインスタンスを初期化します。 + + + 指定されたエラー メッセージを使用して、 クラスの新しいインスタンスを初期化します。 + 例外の原因を説明するエラー メッセージ。 + + + 指定したエラー メッセージと内部例外を使用して、 クラスの新しいインスタンスを初期化します。 + 例外の原因を説明するエラー メッセージ。 + 現在の例外の原因である例外。 が null でない場合は、内部例外を処理する catch ブロックで現在の例外が発生します。 + + + + 例外について割り当てられていない ID のコレクションを表します。 + 割り当てられていない ID のコレクション。 + + + ID を表し、 クラスおよび クラスの基本クラスです。このクラスはパブリック コンストラクターを提供していないため、継承できません。 + + + 指定したオブジェクトが クラスのこのインスタンスと等しいかどうかを示す値を返します。 + + が、基になる型と値がこの インスタンスと同じであるオブジェクトの場合は true。それ以外の場合は false。 + この インスタンスと比較するオブジェクト、または null 参照。 + + + + のハッシュ関数として機能します。 は、ハッシュ アルゴリズムや、ハッシュ テーブルなどのデータ構造での使用に適しています。 + この オブジェクトのハッシュ コード。 + + + 指定した型が クラスの有効な変換型であるかどうかを示す値を返します。 + + クラスの有効な変換型である場合は true。それ以外の場合は false。 + + からの変換として機能するための有効性を照会する型。有効な変換後の型は、次のとおりです。 + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しいかどうかを確認します。これらのオブジェクトが プロパティで返される標準の名前表現と同じ標準の名前表現を持つ場合、またはこれらのオブジェクトがどちらも null である場合は、これらのオブジェクトが等しいと見なされます。 + + が等しい場合は true。それ以外の場合は false。 + 等しいかどうかの比較に使用する左辺の オペランド。このパラメーターは、null に設定できます。 + 等しいかどうかの比較に使用する右辺の オペランド。このパラメーターは、null に設定できます。 + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しくないかどうかを判断します。これらのオブジェクトが プロパティで返される標準の名前表現と異なる標準の名前表現を持つ場合、または一方のオブジェクトが null である場合は、これらのオブジェクトが等しくないと見なされます。 + + が等しくない場合は true。それ以外の場合は false。 + 等しくないかどうかの比較に使用する左辺の オペランド。このパラメーターは、null に設定できます。 + 等しくないかどうかの比較に使用する右辺の オペランド。このパラメーターは、null に設定できます。 + + + + オブジェクトで表される ID の文字列形式を返します。 + ID の文字列形式。 + + + + オブジェクトで表されるアカウント名を他の 派生型に変換します。 + 変換後の ID。 + + からの変換後の型。 + + + + オブジェクトで表される ID の文字列値を取得します。 + + オブジェクトで表される ID の文字列値。 + + + + オブジェクトのコレクションを表し、 から派生したオブジェクトのセットを から派生した型に変換する手段を提供します。 + + + 項目なしのコレクションを使用して、 クラスの新しいインスタンスを初期化します。 + + + 指定した初期サイズを使用して、 クラスの新しいインスタンスを初期化します。 + コレクション内の項目の初期数。 の値はヒントにすぎません。作成された項目の最大数とは限りません。 + + + + コレクションに オブジェクトを追加します。 + コレクションに追加する オブジェクト。 + + + + コレクションからすべての オブジェクトを削除します。 + + + 指定した オブジェクトが コレクションに格納されているかどうかを示します。 + 指定したオブジェクトがコレクションに格納されている場合は true。 + 確認する対象の オブジェクト。 + + + 指定したインデックスを開始位置として、 配列に コレクションをコピーします。 + + コレクションのコピー先の 配列オブジェクト。 + + の 0 から始まるインデックス。この位置を先頭に、 コレクションがコピーされます。 + + + + コレクション内の項目の数を取得します。 + + コレクション内の オブジェクトの数。 + + + + コレクションを反復処理するために使用できる列挙子を取得します。 + + コレクションの列挙子。 + + + + コレクションの指定したインデックス位置にあるノードを取得または設定します。 + コレクション内の指定したインデックス位置の がコレクション内のノードの数以上である場合、戻り値は null です。 + + コレクションの 0 から始まるインデックス。 + + + 指定した オブジェクトをコレクションから削除します。 + 指定したオブジェクトがコレクションから削除された場合は true。 + 削除する オブジェクト。 + + + + + コレクションを反復処理するために使用できる列挙子を取得します。 + + コレクションの列挙子。 + + + コレクション内のオブジェクトを指定した型に変換します。このメソッドを呼び出した場合、2 つ目のパラメーターを false に設定して を呼び出した場合と同じ結果が得られます。この場合、変換に失敗した項目に対して例外がスローされません。 + 元のコレクションの変換後の内容を表す コレクション。 + コレクション内の項目の変換後の型。 + + + + + + コレクション内のオブジェクトを指定した型に変換します。また、指定したフォールト トレランスを使用して、変換後の型が割り当てられていない型に関連付けられたエラーを処理または無視します。 + 元のコレクションの変換後の内容を表す コレクション。 + コレクション内の項目の変換後の型。 + 変換エラーの処理方法を決定するブール値。 が true の場合、変換後の型が割り当てられていないことが原因で変換エラーが発生すると、変換が失敗して例外がスローされます。 が false の場合、変換後の型が割り当てられていないことが原因で変換に失敗した型は、返されるコレクション内に変換されずにコピーされます。 + + + + + + ユーザーまたはグループ アカウントを表します。 + + + 名前を指定して、 クラスの新しいインスタンスを初期化します。 + + オブジェクトの作成に使用する名前。このパラメーターには、null も空の文字列も指定できません。 + + は null なので、 + + が空の文字列です。または が長すぎます。 + + + ドメイン名とアカウント名を指定して、 クラスの新しいインスタンスを初期化します。 + ドメインの名前。このパラメーターには、null または空の文字列を指定できます。ドメイン名が null 値の場合、空の文字列と同様に処理されます。 + アカウントの名前。このパラメーターには、null も空の文字列も指定できません。 + + は null なので、 + + が空の文字列です。または が長すぎます。または が長すぎます。 + + + この オブジェクトが指定したオブジェクトに等しいかどうかを示す値を返します。 + + が、基になる型と値がこの オブジェクトと同じであるオブジェクトの場合は true。それ以外の場合は false。 + この オブジェクトと比較する対象のオブジェクト、または null。 + + + 現在の オブジェクトのハッシュ関数として機能します。 メソッドは、ハッシュ アルゴリズムや、ハッシュ テーブルなどのデータ構造での使用に適しています。 + 現在の オブジェクトのハッシュ値。 + + + 指定した型が クラスの有効な変換型であるかどうかを示す値を返します。 + + クラスの有効な変換型である場合は true。それ以外の場合は false。 + + からの変換として機能するための有効性を照会する型。有効な変換後の型は、次のとおりです。- - + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しいかどうかを確認します。これらのオブジェクトが プロパティで返される標準の名前表現と同じ標準の名前表現を持つ場合、またはこれらのオブジェクトがどちらも null である場合は、これらのオブジェクトが等しいと見なされます。 + + が等しい場合は true。それ以外の場合は false。 + 等しいかどうかの比較に使用する左のオペランド。このパラメーターは、null に設定できます。 + 等しいかどうかの比較に使用する右のオペランド。このパラメーターは、null に設定できます。 + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しくないかどうかを判断します。これらのオブジェクトが プロパティで返される標準の名前表現と異なる標準の名前表現を持つ場合、または一方のオブジェクトが null である場合は、これらのオブジェクトが等しくないと見なされます。 + + が等しくない場合は true。それ以外の場合は false。 + 等しくないかどうかの比較に使用する左のオペランド。このパラメーターは、null に設定できます。 + 等しくないかどうかの比較に使用する右のオペランド。このパラメーターは、null に設定できます。 + + + + オブジェクトで表されるアカウントのアカウント名を Domain\Account 形式で返します。 + Domain\Account 形式のアカウント名。 + + + + オブジェクトで表されるアカウント名を他の 派生型に変換します。 + 変換後の ID。 + + からの変換後の型。変換後の型は、 メソッドで有効と見なされる型である必要があります。 + + が null です。 + + 型ではありません。 + ID 参照の一部またはすべてを変換できませんでした。 + ソース アカウント名が長すぎます。またはWin32 エラー コードが返されました。 + + + + + + この オブジェクトの大文字の文字列形式を返します。 + この オブジェクトの大文字の文字列形式。 + + + + + + セキュリティ識別子 (SID) を表し、SID のマーシャリングおよび比較演算を実現します。 + + + セキュリティ識別子 (SID) の指定したバイナリ表現を使用して、 クラスの新しいインスタンスを初期化します。 + SID を表すバイト配列。 + + の開始インデックスとして使用するバイト オフセット。 + + + セキュリティ識別子 (SID) のバイナリ形式を表す整数を使用して、 クラスの新しいインスタンスを初期化します。 + SID のバイナリ形式を表す整数。 + + + 一般的なセキュリティ識別子 (SID) の種類とドメイン SID を指定して、 クラスの新しいインスタンスを初期化します。 + 列挙値の 1 つ。この値は にしないでください。 + ドメイン SID。この値は、次の 値に必要です。このパラメーターは、その他の 値については無視されます。- - - - - - - - - - - - - + + + SDDL (Security Descriptor Definition Language) 形式の指定したセキュリティ識別子 (SID) を使用して、 クラスの新しいインスタンスを初期化します。 + + オブジェクトを作成するために使用された SID の SDDL 文字列。 + + + SID が Windows アカウントの SID を表す場合、 オブジェクトで表される SID からアカウント ドメイン セキュリティ識別子 (SID) 部分が返されます。SID が Windows アカウントの SID を表さない場合、このプロパティは を返します。 + SID が Windows アカウントの SID を表す場合、 オブジェクトで表される SID のアカウント ドメイン SID 部分。それ以外の場合は が返されます。 + + + + オブジェクトで表されるセキュリティ識別子 (SID) の長さがバイト単位で返されます。 + + オブジェクトで表される SID の長さ ( バイト単位)。 + + + 現在の オブジェクトと、指定した オブジェクトとを比較します。 + このインスタンスと の相対値を示す符号付き数値。戻り値説明0 より小さい値このインスタンスは、 よりも小さくなっています。0このインスタンスは と等価です。0 を超える値このインスタンスは よりも大きくなっています。 + 現在のオブジェクトと比較するオブジェクト。 + + + この オブジェクトが指定したオブジェクトに等しいかどうかを示す値を返します。 + + が、基になる型と値がこの オブジェクトと同じであるオブジェクトの場合は true。それ以外の場合は false。 + この オブジェクトと比較する対象のオブジェクト、または null。 + + + 指定した オブジェクトが、現在の オブジェクトと等しいかどうかを示します。 + + の値が現在の オブジェクトの値に等しい場合は true。 + 現在のオブジェクトと比較するオブジェクト。 + + + + クラスで表される指定したセキュリティ識別子 (SID) のバイナリ表現をバイト配列にコピーします。 + コピーされた SID を受け取るバイト配列。 + + の開始インデックスとして使用するバイト オフセット。 + + + 現在の オブジェクトのハッシュ関数として機能します。 メソッドは、ハッシュ アルゴリズムや、ハッシュ テーブルなどのデータ構造での使用に適しています。 + 現在の オブジェクトのハッシュ値。 + + + この オブジェクトで表されるセキュリティ識別子 (SID) が有効な Windows アカウント SID であるかどうかを示す値を返します。 + この オブジェクトで表される SID が有効な Windows アカウント SID である場合は true。それ以外の場合は false。 + + + この オブジェクトで表されるセキュリティ識別子 (SID) が指定した SID と同じドメインにあるかどうかを示す値を返します。 + この オブジェクトで表される SID が の SID と同じドメインにある場合は true。それ以外の場合は false。 + この オブジェクトと比較する SID。 + + + 指定した型が クラスの有効な変換型であるかどうかを示す値を返します。 + + クラスの有効な変換型である場合は true。それ以外の場合は false。 + + からの変換として機能するための有効性を照会する型。有効な変換後の型は、次のとおりです。- - + + + + オブジェクトが、指定した一般的なセキュリティ識別子 (SID) の種類と一致するかどうかを示す値を返します。 + + オブジェクトの SID の種類である場合は true。それ以外の場合は false。 + + オブジェクトと比較する値。 + + + セキュリティ識別子のバイナリ表現の最大サイズをバイト単位で返します。 + + + セキュリティ識別子のバイナリ表現の最小サイズをバイト単位で返します。 + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しいかどうかを確認します。これらのオブジェクトが プロパティで返される標準の名前表現と同じ標準の名前表現を持つ場合、またはこれらのオブジェクトがどちらも null である場合は、これらのオブジェクトが等しいと見なされます。 + + が等しい場合は true。それ以外の場合は false。 + 等しいかどうかの比較に使用する左のオペランド。このパラメーターは、null に設定できます。 + 等しいかどうかの比較に使用する右のオペランド。このパラメーターは、null に設定できます。 + + + 2 つの オブジェクトを比較し、それらのオブジェクトが等しくないかどうかを判断します。これらのオブジェクトが プロパティで返される標準の名前表現と異なる標準の名前表現を持つ場合、または一方のオブジェクトが null である場合は、これらのオブジェクトが等しくないと見なされます。 + + が等しくない場合は true。それ以外の場合は false。 + 等しくないかどうかの比較に使用する左のオペランド。このパラメーターは、null に設定できます。 + 等しくないかどうかの比較に使用する右のオペランド。このパラメーターは、null に設定できます。 + + + + オブジェクトで表されるアカウントのセキュリティ識別子 (SID) を SDDL (Security Descriptor Definition Language) 形式で返します。SDDL 形式の例は S-1-5-9 です。 + + オブジェクトで表されるアカウントの SDDL 形式の SID。 + + + + オブジェクトで表されるアカウント名を他の 派生型に変換します。 + 変換後の ID。 + + からの変換後の型。変換後の型は、 メソッドで有効と見なされる型である必要があります。 + + が null です。 + + 型ではありません。 + ID 参照の一部またはすべてを変換できませんでした。 + Win32 エラー コードが返されました。 + + + + + + この オブジェクトで表されるセキュリティ識別子 (SID) に対する大文字の SDDL (Security Descriptor Definition Language) 文字列を返します。 + + オブジェクトで表される SID に対する大文字の SDDL 文字列。 + + + + + + アクセス トークンに関連付けられたユーザー アカウントの特権を定義します。 + + + ユーザーは、トークンの既定の所有者、プライマリ グループ、または随意アクセス制御リスト (DACL: Discretionary Access Control List) を変更できます。 + + + ユーザーは、トークン内のグループの属性を変更できます。 + + + ユーザーは、トークン内の特権を有効または無効にできます。 + + + ユーザーは、トークンのセッション ID を調整できます。 + + + ユーザーは、トークンに対するすべての有効なアクセス権を持ちます。 + + + ユーザーは、プライマリ トークンをプロセスに割り当てることができます。 + + + ユーザーは、トークンを複製できます。 + + + ユーザーは、クライアントを偽装できます。 + + + + 列挙体に割り当てることができる最大値。 + + + ユーザーは、トークンを照会できます。 + + + ユーザーは、トークンのソースを照会できます。 + + + ユーザーは、トークンに関する標準の読み取り権限と 特権を持ちます。 + + + ユーザーは、トークンに関する標準の書き込み権限、 特権、および 特権を持ちます。 + + + 一般的に使用されるセキュリティ識別子 (SID) を定義します。 + + + Account Administrators グループに一致する SID を示します。 + + + Certificate Administrators グループに一致する SID を示します。 + + + Account Computer グループに一致する SID を示します。 + + + Account Controller グループに一致する SID を示します。 + + + Account Domain Administrator グループに一致する SID を示します。 + + + Account Domain Guests グループに一致する SID を示します。 + + + Account Domain Users グループに一致する SID を示します。 + + + Enterprise Administrators グループに一致する SID を示します。 + + + Account Guest グループに一致する SID を示します。 + + + Account Kerberos Target グループに一致する SID を示します。 + + + Policy Administrators グループに一致する SID を示します。 + + + RAS and IAS Server アカウントに一致する SID を示します。 + + + Schema Administrators グループに一致する SID を示します。 + + + 匿名アカウントの SID を示します。 + + + 認証済みユーザーの SID を示します。 + + + バッチ プロセスの SID を示します。この SID は、トークンのプロセスがバッチ ジョブとしてログオンすると、このプロセスに追加されます。 + + + Account Operators アカウントに一致する SID を示します。 + + + Administrator アカウントに一致する SID を示します。 + + + Windows Authorization Access グループに一致する SID を示します。 + + + Backup Operators グループに一致する SID を示します。 + + + Domain アカウントに一致する SID を示します。 + + + Guest アカウントに一致する SID を示します。 + + + 入力方向のフォレストの信頼の作成をユーザーに許可する SID を示します。この SID は、フォレストのルート ドメイン内にある Incoming Forest Trust Builders 組み込みグループのメンバーであるユーザーのトークンに追加されます。 + + + Network Operators グループに一致する SID を示します。 + + + コンピューターを監視するためのリモート アクセス権を持つユーザー グループと一致する SID を示します。 + + + このコンピューターのパフォーマンス カウンターのログをスケジュールするためのリモート アクセス権を持つユーザー グループと一致する SID を示します。 + + + Power Users グループに一致する SID を示します。 + + + Windows 2000 以前のコンピューターとの互換性があるアカウントに一致する SID を示します。 + + + Print Operators グループに一致する SID を示します。 + + + Remote Desktop Users グループに一致する SID を示します。 + + + Replicator アカウントに一致する SID を示します。 + + + System Operators グループに一致する SID を示します。 + + + 組み込みの Users アカウントに一致する SID を示します。 + + + Creator グループ サーバーの SID を示します。 + + + オブジェクトの Creator グループに一致する SID を示します。 + + + Creator Owner サーバーの SID を示します。 + + + オブジェクトの所有者または作成者に一致する SID を示します。 + + + ダイアルアップ アカウントの SID を示します。 + + + Microsoft ダイジェスト認証パッケージがクライアントを認証したときに存在する SID を示します。 + + + エンタープライズ コントローラーの SID を示します。 + + + Interactive アカウントの SID を示します。この SID は、トークンのプロセスが対話形式でログオンすると、このプロセスに追加されます。 + + + ローカル サービスに一致する SID を示します。 + + + ローカル SID を示します。 + + + ローカル システムに一致する SID を示します。 + + + ログオン ID に一致する SID を示します。 + + + + 列挙体で最大に定義された SID を示します。 + + + ネットワーク サービスに一致する SID を示します。 + + + ネットワーク アカウントの SID を示します。この SID は、トークンのプロセスがネットワークにログオンすると、このプロセスに追加されます。 + + + Windows NT 権限の SID を示します。 + + + Microsoft NTLM 認証パッケージがクライアントを認証したときに存在する SID を示します。 + + + null の SID を示します。 + + + 選択的認証オプションが有効にされているフォレスト全体でユーザーが認証されたときに存在する SID を示します。この SID が存在する場合、 は存在できません。 + + + プロキシの SID を示します。 + + + リモート ログオンに一致する SID を示します。 + + + 制限付きコードの SID を示します。 + + + セキュア チャネル (SSL/TLS) 認証パッケージがクライアントを認証したときに存在する SID を示します。 + + + Self の SID を示します。 + + + サービスの SID を示します。この SID は、トークンのプロセスがサービスとしてログオンすると、このプロセスに追加されます。 + + + ターミナル サーバー アカウントに一致する SID を示します。 + + + 選択的認証オプションが有効にされていないフォレスト内または信頼からユーザーが認証されたときに存在する SID を示します。この SID が存在する場合、 は存在できません。 + + + ターミナル サーバー ライセンスを発行できるサーバー内に存在する SID を示します。 + + + すべてのユーザーに一致する SID を示します。 + + + + で使用する一般的なロールを定めます。 + + + アカウント オペレーターは、コンピューター上またはドメイン上でユーザー アカウントを管理します。 + + + 管理者は、コンピューターまたはドメインに対して完全で、無制限のアクセス権を所有しています。 + + + バックアップ オペレーターは、ファイルのバックアップまたは復元の目的だけでセキュリティ制限をオーバーライドできます。 + + + ゲストには、ユーザーよりも制約があります。 + + + パワー ユーザーは、いくつかの制限付きで、管理者とほぼ同等のアクセス許可を所有しています。したがって、パワー ユーザーは、保証されたアプリケーションだけでなくレガシ アプリケーションも実行できます。 + + + 印刷オペレーターは、プリンターを制御できます。 + + + レプリケーターは、ドメイン内のファイルのレプリケーションをサポートします。 + + + システム オペレーターは、特定のコンピューターを管理します。 + + + ユーザーは、偶然または意図的に、システム全体にわたる変更を行うことはできません。したがって、保証されたアプリケーションは実行できますが、多くのレガシ アプリケーションは実行できません。 + + + Windows ユーザーを表します。 + + + 指定した Windows アカウント トークンによって表されるユーザーを表す、 クラスの新しいインスタンスを初期化します。 + コードが実行されている対象ユーザーのアカウント トークン。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + 指定した Windows アカウント トークンと指定した認証の種類によって表されるユーザーを表す、 クラスの新しいインスタンスを初期化します。 + コードが実行されている対象ユーザーのアカウント トークン。 + (参照専用。) ユーザーを識別するために使用する認証の種類。詳細については、「解説」を参照してください。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [セキュリティ クリティカル] この インスタンスのこの を取得します。 + + を返します。 + + + + によって使用されているすべてのリソースを解放します。 + + + + で使用されているアンマネージ リソースを解放します。オプションとして、マネージ リソースを解放することもできます。 + マネージ リソースとアンマネージ リソースの両方を解放する場合は true。アンマネージ リソースだけを解放する場合は false。 + + + 匿名ユーザーを表すために、コード内で sentinel 値として使用できる オブジェクトを返します。プロパティ値は、Windows オペレーティング システムが使用する組み込み匿名 ID を表しません。 + 匿名のユーザーを表すオブジェクト。 + + + 現在の Windows ユーザーを表す オブジェクトを返します。 + 現在のユーザーを表すオブジェクト。 + The caller does not have the correct permissions. + + + + + + + パラメーターの値に応じてスレッドまたはプロセスの Windows ID を表す オブジェクトを返します。 + Windows ユーザーを表すオブジェクト。 + スレッドが現在偽装中の場合にだけ を返すには、true。スレッドが偽装中の場合にスレッドの を返すか、またはスレッドが現在偽装中でない場合にプロセスの を返すには、false。 + + + + + + 目的のトークン アクセス レベルを指定して現在の Windows ユーザーを表す オブジェクトを返します。 + 現在のユーザーを表すオブジェクト。 + 列挙値のビットごとの組み合わせ。 + + + + + + 現在の Windows ユーザーが属しているグループを取得します。 + 現在の Windows ユーザーが属しているグループを表すオブジェクト。 + + + ユーザーの偽装レベルを取得します。 + 偽装レベルを指定する列挙値の 1 つ。 + + + システムによってユーザー アカウントが匿名アカウントとして識別されているかどうかを示す値を取得します。 + ユーザー アカウントが匿名アカウントである場合は true。それ以外の場合は false。 + + + システムによってユーザー アカウントが アカウントとして識別されているかどうかを示す値を取得します。 + ユーザー アカウントが アカウントである場合は true。それ以外の場合は false。 + + + システムによってユーザー アカウントが アカウントとして識別されているかどうかを示す値を取得します。 + ユーザー アカウントが アカウントである場合は true。それ以外の場合は false。 + + + トークン所有者のセキュリティ識別子 (SID) を取得します。 + トークン所有者のオブジェクト。 + + + 指定したアクションを、偽装した Windows ID として実行します。偽装したメソッド呼び出しを使用して で関数を実行するのではなく、 を使用して関数をパラメーターとして直接指定することができます。 + 偽装した Windows ID の SafeAccessTokenHandle。 + 実行する System.Action。 + + + 指定した関数を、偽装した Windows ID として実行します。偽装したメソッド呼び出しを使用して で関数を実行するのではなく、 を使用して関数をパラメーターとして直接指定することができます。 + 関数の結果を返します。 + 偽装した Windows ID の SafeAccessTokenHandle。 + 実行する System.Func。 + 関数によって使用され、関数によって返されるオブジェクトの型。 + + + ユーザーのセキュリティ識別子 (SID) を取得します。 + ユーザーのオブジェクト。 + + + コードによって Windows ユーザーの Windows グループ メンバーシップを確認できるようにします。 + + + 指定した オブジェクトを使用して、 クラスの新しいインスタンスを初期化します。 + + の新しいインスタンスの生成元となるオブジェクト。 + + は null なので、 + + + 現在のプリンシパルが、指定した相対識別子 (RID) の Windows ユーザー グループに属しているかどうかを確認します。 + 現在のプリンシパルが、指定した Windows ユーザー グループのメンバーである、つまり特定のロール内にある場合は true。それ以外の場合は false。 + プリンシパルのメンバーシップ状態を確認する Windows ユーザー グループの RID。 + + + + + + 現在のプリンシパルが、指定したセキュリティ識別子 (SID) の Windows ユーザー グループに属しているかどうかを確認します。 + 現在のプリンシパルが、指定した Windows ユーザー グループのメンバーである場合は true。それ以外の場合は false。 + Windows ユーザー グループを一意に識別する 。 + + は null なので、 + Windows は Win32 エラーを返します。 + + + + + + 現在のプリンシパルが、指定した の Windows ユーザー グループに属しているかどうかを確認します。 + 現在のプリンシパルが、指定した Windows ユーザー グループのメンバーである場合は true。それ以外の場合は false。 + + 値のいずれか。 + + が有効な 値ではありません。 + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ko/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ko/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..b76ac12 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ko/System.Security.Principal.Windows.xml @@ -0,0 +1,798 @@ + + + + System.Security.Principal.Windows + + + + [보안 중요] Windows 스레드 또는 프로세스 액세스 토큰에 대한 SafeHandle을 제공합니다.자세한 내용은 액세스 토큰을 참조하세요. + + + [보안 중요] 클래스의 새 인스턴스를 초기화합니다. + 사용할 기존 핸들을 나타내는 개체입니다.를 사용하면 잘못된 핸들이 반환됩니다. + + + [보안 중요] 개체를 인스턴스화하여 잘못된 핸들을 반환합니다. + + 개체를 반환합니다. + + + [보안 중요] 핸들이 잘못되었는지 여부를 나타내는 값을 가져옵니다. + 핸들이 잘못되었으면 true이고, 그렇지 않으면 false입니다. + + + 해당 ID를 알려진 ID로 매핑할 수 없는 보안 주체에 대한 예외를 나타냅니다. + + + + 클래스의 새 인스턴스를 초기화합니다. + + + 지정된 오류 메시지를 사용하여 클래스의 새 인스턴스를 초기화합니다. + 예외에 대한 이유를 설명하는 오류 메시지입니다. + + + 지정된 오류 메시지와 내부 예외를 사용하여 클래스의 새 인스턴스를 초기화합니다. + 예외에 대한 이유를 설명하는 오류 메시지입니다. + 현재 예외의 원인이 되는 예외입니다.가 Null이 아니면 현재 예외는 내부 예외를 처리하는 catch 블록에서 발생합니다. + + + + 예외에 대해 매핑되지 않은 ID 컬렉션을 나타냅니다. + 매핑되지 않은 ID의 컬렉션입니다. + + + ID를 나타내며 클래스의 기본 클래스입니다.이 클래스는 공용 생성자를 제공하지 않으므로 상속될 수 없습니다. + + + 지정한 개체가 클래스의 이 인스턴스와 같은지 여부를 나타내는 값을 반환합니다. + + 가 이 인스턴스와 같은 내부 형식 및 값을 가지는 개체이면 true이고, 그렇지 않으면 false입니다. + 인스턴스와 비교할 개체 또는 Null 참조입니다. + + + + 에 대한 해시 함수 역할을 합니다.는 해시 알고리즘 및 해시 테이블과 같은 데이터 구조에 사용하기 적당합니다. + 해당 개체의 해시 코드를 반환합니다. + + + 지정한 형식이 클래스에 대해 유효한 변환 형식인지 여부를 나타내는 값을 반환합니다. + + 클래스에 대해 유효한 변환 형식이면 true이고, 그렇지 않으면 false입니다. + + 에서 변환할 수 있는 유효한 대상인지 쿼리할 형식입니다.유효한 대상 형식은 다음과 같습니다. + + + 개체가 동일한지 비교합니다.두 개체가 속성에 의해 반환된 것과 동일한 정식 이름 표현을 가지거나 둘 다 null인 경우 같은 것으로 간주됩니다. + + 가 같으면 true이고, 그렇지 않으면 false입니다. + 같은지 비교할 때 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 같은지 비교할 때 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + 개체가 동일하지 않은지 비교합니다.두 개체가 속성에 의해 반환된 것과 다른 정식 이름 표현을 가지거나 개체 중 하나는 null이고 나머지는 그렇지 않을 경우 다른 것으로 간주됩니다. + + 가 같지 않으면 true이고, 그렇지 않으면 false입니다. + 다른지 비교할 때 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 다른지 비교할 때 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + + 개체로 표시한 ID의 문자열 표현을 반환합니다. + 문자열 형식의 ID입니다. + + + + 개체로 표시한 계정 이름을 다른 파생 형식으로 변환합니다. + 변환된 ID입니다. + + 에서 변환할 대상 형식입니다. + + + + 개체로 표시한 ID의 문자열 값을 가져옵니다. + + 개체로 표시한 ID의 문자열 값입니다. + + + + 개체의 컬렉션을 나타내고 파생 개체 집합을 파생 형식으로 변환할 수단을 제공합니다. + + + 컬렉션의 0 항목을 사용하여 클래스의 새 인스턴스를 초기화합니다. + + + 지정된 초기 크기를 사용하여 클래스의 새 인스턴스를 초기화합니다. + 컬렉션의 초기 항목 수입니다. 값은 힌트를 제공하기 위한 것일 뿐이며 반드시 작성된 최대 항목의 수에 해당하는 것은 아닙니다. + + + + 컬렉션에 개체를 추가합니다. + 컬렉션에 추가할 개체입니다. + + + + 컬렉션에서 개체를 모두 지웁니다. + + + + 컬렉션에 지정된 개체가 들어 있는지 여부를 나타냅니다. + 컬렉션에 지정된 개체가 포함되어 있으면 true입니다. + 확인할 개체입니다. + + + + 컬렉션을 지정된 인덱스에서 시작하여 배열에 복사합니다. + + 컬렉션을 복사할 배열 개체입니다. + + 컬렉션이 복사될 의 인덱스(0부터 시작)입니다. + + + + 컬렉션의 항목 수를 가져옵니다. + + 컬렉션의 개체 수입니다. + + + + 컬렉션을 반복하는 데 사용할 수 있는 열거자를 가져옵니다. + + 컬렉션에 대한 열거자입니다. + + + + 컬렉션의 지정된 인덱스에 있는 노드를 설정하거나 가져옵니다. + 컬렉션의 지정된 인덱스에 있는 입니다.가 컬렉션의 노드 수보다 크거나 같으면 반환 값은 null입니다. + + 컬렉션의 인덱스(0부터 시작)입니다. + + + 컬렉션에서 지정된 개체를 제거합니다. + 지정된 개체가 컬렉션에서 제거되었으면 true입니다. + 제거할 개체입니다. + + + + + 컬렉션을 반복하는 데 사용할 수 있는 열거자를 가져옵니다. + + 컬렉션에 대한 열거자입니다. + + + 컬렉션의 개체를 지정된 형식으로 변환합니다.이 메서드를 호출하면 두 번째 매개 변수를 false로 설정하여 를 호출하는 것과 동일한 결과를 가져옵니다. 즉, 변환에 실패한 항목에 대해 예외가 throw되지 않습니다. + 원래 컬렉션의 변환된 내용을 나타내는 컬렉션입니다. + 컬렉션의 항목을 변환할 형식입니다. + + + + + + 컬렉션의 개체를 지정된 형식으로 변환하고 지정된 내결함성을 사용하여 변환 매핑이 없는 형식과 관련된 오류를 처리하거나 무시합니다. + 원래 컬렉션의 변환된 내용을 나타내는 컬렉션입니다. + 컬렉션의 항목을 변환할 형식입니다. + 변환 오류 처리 방식을 결정하는 부울 값입니다.가 true이면 이동에 대한 매핑이 발견되지 않기 때문에 변환 오류가 발생하여 변환이 실패하고 예외가 throw됩니다.가 false이면 이동에 대한 매핑이 발견되지 않기 때문에 변환되지 못한 형식이 반환되는 컬렉션으로 변환되지 않고 복사됩니다. + + + + + + 사용자 또는 그룹 계정을 나타냅니다. + + + 지정된 이름을 사용하여 클래스의 새 인스턴스를 초기화합니다. + + 개체를 만드는 데 사용되는 이름입니다.이 매개 변수는 null 또는 빈 문자열일 수 없습니다. + + 가 null입니다. + + 이 빈 문자열인 경우또는가 너무 깁니다. + + + 지정된 도메인 이름 및 계정 이름을 사용하여 클래스의 새 인스턴스를 초기화합니다. + 도메인의 이름입니다.이 매개 변수는 null 또는 빈 문자열일 수 있습니다.값이 Null인 도메인 이름은 빈 문자열처럼 취급됩니다. + 계정의 이름입니다.이 매개 변수는 null 또는 빈 문자열일 수 없습니다. + + 가 null입니다. + + 이 빈 문자열인 경우또는가 너무 깁니다.또는가 너무 깁니다. + + + 개체가 지정된 개체와 같은지 여부를 나타내는 값을 반환합니다. + + 가 이 개체와 같은 내부 형식 및 값을 가지는 개체이면 true이고, 그렇지 않으면 false입니다. + 개체와 비교할 개체이거나 null입니다. + + + 현재 개체의 해시 함수로 사용됩니다. 메서드는 해시 테이블과 같은 해시 알고리즘 및 데이터 구조에 적합합니다. + 현재 개체의 해시 값입니다. + + + 지정한 형식이 클래스에 대해 유효한 변환 형식인지 여부를 나타내는 값을 반환합니다. + + 클래스에 대해 유효한 변환 형식이면 true이고, 그렇지 않으면 false입니다. + + 에서 변환할 수 있는 유효한 대상인지 쿼리할 형식입니다.유효한 대상 형식은 다음과 같습니다.- - + + + 개체가 동일한지 비교합니다.두 개체가 속성에 의해 반환된 것과 동일한 정식 이름 표현을 가지거나 둘 다 null인 경우 같은 것으로 간주됩니다. + + 가 같으면 true이고, 그렇지 않으면 false입니다. + 같음 비교에 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 같음 비교에 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + 개체가 동일하지 않은지 비교합니다.두 개체가 속성에 의해 반환된 것과 다른 정식 이름 표현을 가지거나 개체 중 하나는 null이고 나머지는 그렇지 않을 경우 다른 것으로 간주됩니다. + + 가 같지 않으면 true이고, 같으면 false입니다. + 다음 비교에 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 다름 비교에 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + + 개체가 나타내는 계정의 이름을 Domain\Account 형식으로 반환합니다. + Domain\Account 형식의 계정 이름입니다. + + + + 개체로 표시된 계정 이름을 다른 파생 형식으로 변환합니다. + 변환된 ID입니다. + + 에서 변환할 대상 형식입니다.대상 형식은 메서드에 의해 유효한 것으로 간주되는 형식이어야 합니다. + + 가 null인 경우 + + 형식이 아닌 경우 + ID 참조의 일부 또는 전부를 변환할 수 없습니다. + 소스 계정 이름이 너무 깁니다.또는Win32 오류 코드가 반환되었습니다. + + + + + + 개체에 대한 대문자 문자열 표시를 반환합니다. + 개체에 대한 대문자 문자열 표시입니다. + + + + + + SID(보안 식별자)를 나타내며 SID의 마샬링 및 비교 작업을 제공합니다. + + + SID(보안 식별자)의 지정된 이진 표시를 사용하여 클래스의 새 인스턴스를 초기화합니다. + SID를 나타내는 바이트 배열입니다. + 시작 인덱스로 사용할 의 바이트 오프셋입니다. + + + SID(보안 식별자)의 이진 형식을 나타내는 정수를 사용하여 클래스의 새 인스턴스를 초기화합니다. + SID의 이진 형식을 나타내는 정수입니다. + + + 알려진 특정 SID(보안 식별자) 형식 및 도메인 SID를 사용하여 클래스의 새 인스턴스를 초기화합니다. + 열거형 값 중 하나입니다.이 값은 이면 안 됩니다. + 도메인 SID입니다.이 값은 다음 값에 대해 필수이며다른 값에 대해서는 무시됩니다.- - - - - - - - - - - - - + + + SDDL(Security Descriptor Definition Language) 형식의 지정된 SID(보안 식별자)를 사용하여 클래스의 새 인스턴스를 초기화합니다. + + 개체를 만드는 데 사용하는 SID의 SDDL 문자열입니다. + + + SID(보안 식별자)가 Windows 계정 SID를 나타낼 경우 개체로 표시된 SID에서 계정 도메인 SID 부분을 반환합니다.SID가 Windows 계정 SID를 나타내지 않으면 이 속성은 을 반환합니다. + SID가 Windows 계정 SID를 나타낼 경우 개체로 표시된 SID에서 계정 도메인 SID 부분을 반환하고, 그렇지 않으면 을 반환합니다. + + + + 개체로 표시된 SID(보안 식별자)의 길이(바이트 단위)를 반환합니다. + + 개체로 표시된 SID의 길이(바이트 단위)입니다. + + + 현재 개체를 지정된 개체와 비교합니다. + 이 인스턴스와 의 상대 값을 나타내는 부호 있는 숫자입니다.반환 값 설명 0보다 작음 이 인스턴스는 보다 작습니다. Zero 이 인스턴스는 와 같습니다. 0보다 큼 이 인스턴스는 보다 큽니다. + 현재 개체와 비교할 개체입니다. + + + 개체가 지정된 개체와 같은지 여부를 나타내는 값을 반환합니다. + + 가 이 개체와 같은 내부 형식 및 값을 가지는 개체이면 true이고, 그렇지 않으면 false입니다. + 개체와 비교할 개체이거나 null입니다. + + + 지정된 개체가 현재 개체와 같은지 여부를 나타냅니다. + + 의 값이 현재 개체의 값과 같으면 true입니다. + 현재 개체와 비교할 개체입니다. + + + + 클래스로 표시된 특정 SID(보안 식별자)의 이진 표현을 바이트 배열로 복사합니다. + 복사된 SID를 받을 바이트 배열입니다. + 시작 인덱스로 사용할 의 바이트 오프셋입니다. + + + 현재 개체의 해시 함수로 사용됩니다. 메서드는 해시 테이블과 같은 해시 알고리즘 및 데이터 구조에 적합합니다. + 현재 개체의 해시 값입니다. + + + 개체로 표시된 SID(보안 식별자)가 유효한 Windows 계정 SID인지 여부를 나타내는 값을 반환합니다. + 개체로 표시된 SID가 유효한 Windows 계정 SID이면 true이고, 그렇지 않으면 false입니다. + + + 개체로 표시된 SID(보안 식별자)가 지정된 SID와 동일한 도메인에 속하는지 여부를 나타내는 값을 반환합니다. + 개체로 표시된 SID가 SID와 동일한 도메인에 있으면 true이고, 그렇지 않으면 false입니다. + 개체와 비교할 SID입니다. + + + 지정한 형식이 클래스에 대해 유효한 변환 형식인지 여부를 나타내는 값을 반환합니다. + + 클래스에 대해 유효한 변환 형식이면 true이고, 그렇지 않으면 false입니다. + + 에서 변환할 수 있는 유효한 대상인지 쿼리할 형식입니다.유효한 대상 형식은 다음과 같습니다.- - + + + + 개체가 알려진 특정 SID(보안 식별자) 형식과 일치하는지 여부를 나타내는 값을 반환합니다. + + 개체에 대한 SID 형식이면 true이고, 그렇지 않으면 false입니다. + + 개체와 비교할 값입니다. + + + 보안 식별자의 이진 표현에 대한 최대 크기(바이트 단위)를 반환합니다. + + + 보안 식별자의 이진 표현에 대한 최소 크기(바이트 단위)를 반환합니다. + + + 개체가 동일한지 비교합니다.두 개체가 속성에 의해 반환된 것과 동일한 정식 표현을 가지거나 둘 다 null인 경우 같은 것으로 간주됩니다. + + 가 같으면 true이고, 그렇지 않으면 false입니다. + 같음 비교에 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 같음 비교에 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + 개체가 동일하지 않은지 비교합니다.두 개체가 속성에 의해 반환된 것과 다른 정식 이름 표현을 가지거나 개체 중 하나는 null이고 나머지는 그렇지 않을 경우 다른 것으로 간주됩니다. + + 가 같지 않으면 true이고, 그렇지 않으면 false입니다. + 다음 비교에 사용할 왼쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + 다름 비교에 사용할 오른쪽 피연산자입니다.이 매개 변수는 null일 수 있습니다. + + + + 개체로 표시된 계정에 대해 SDDL(Security Descriptor Definition Language) 형식의 SID(보안 식별자)를 반환합니다.SDDL 형식의 예로는 S-1-5-9를 들 수 있습니다. + + 개체로 표시된 계정에 대한 SDDL 형식의 SID입니다. + + + + 개체로 표시된 계정 이름을 다른 파생 형식으로 변환합니다. + 변환된 ID입니다. + + 에서 변환할 대상 형식입니다.대상 형식은 메서드에 의해 유효한 것으로 간주되는 형식이어야 합니다. + + 가 null인 경우 + + 형식이 아닌 경우 + ID 참조의 일부 또는 전부를 변환할 수 없습니다. + Win32 오류 코드가 반환되었습니다. + + + + + + 개체로 표시된 SID(보안 식별자)에 대한 대문자 SDDL(Security Descriptor Definition Language) 문자열을 반환합니다. + + 개체로 표시된 SID에 대한 대문자 SDDL 문자열입니다. + + + + + + 액세스 토큰과 관련된 사용자 계정의 권한을 정의합니다. + + + 사용자는 토큰의 기본 소유자, 기본 그룹 또는 DACL(임의 액세스 제어 목록)을 변경할 수 있습니다. + + + 사용자는 토큰에 포함된 그룹의 특성을 변경할 수 있습니다. + + + 사용자는 토큰의 권한을 활성화하거나 비활성화할 수 있습니다. + + + 사용자는 토큰의 세션 식별자를 조정할 수 있습니다. + + + 사용자는 토큰에 대해 가능한 모든 액세스 권한을 갖습니다. + + + 사용자는 기본 토큰을 프로세스에 연결할 수 있습니다. + + + 사용자는 토큰을 복제할 수 있습니다. + + + 사용자는 클라이언트를 가장할 수 있습니다. + + + + 열거형에 대해 지정할 수 있는 최대값입니다. + + + 사용자는 토큰을 쿼리할 수 있습니다. + + + 사용자는 토큰의 소스를 쿼리할 수 있습니다. + + + 사용자는 토큰에 대해 표준 읽기 권한 및 권한을 갖습니다. + + + 사용자는 토큰에 대해 표준 쓰기 권한 및 권한을 갖습니다. + + + 일반적으로 사용되는 SID(보안 식별자) 집합을 정의합니다. + + + 계정 관리자 그룹과 일치하는 SID를 나타냅니다. + + + 인증서 관리자 그룹과 일치하는 SID를 나타냅니다. + + + 계정 컴퓨터 그룹과 일치하는 SID를 나타냅니다. + + + 계정 컨트롤러 그룹과 일치하는 SID를 나타냅니다. + + + 계정 도메인 관리자 그룹과 일치하는 SID를 나타냅니다. + + + 계정 도메인 게스트 그룹과 일치하는 SID를 나타냅니다. + + + 계정 도메인 사용자 그룹과 일치하는 SID를 나타냅니다. + + + 엔터프라이즈 관리자 그룹과 일치하는 SID를 나타냅니다. + + + 계정 게스트 그룹과 일치하는 SID를 나타냅니다. + + + 계정 Kerberos 대상 그룹과 일치하는 SID를 나타냅니다. + + + 정책 관리자 그룹과 일치하는 SID를 나타냅니다. + + + RAS 및 IAS 서버 계정과 일치하는 SID를 나타냅니다. + + + 스키마 관리자 그룹과 일치하는 SID를 나타냅니다. + + + 익명 계정에 대한 SID를 나타냅니다. + + + 인증된 사용자에 대한 SID를 나타냅니다. + + + 일괄 처리 프로세스에 대한 SID를 나타냅니다.이 SID는 일괄 처리 작업으로 로그온할 때 토큰의 프로세스에 추가됩니다. + + + 계정 운영자 계정과 일치하는 SID를 나타냅니다. + + + 관리자 계정과 일치하는 SID를 나타냅니다. + + + Windows 인증 액세스 그룹과 일치하는 SID를 나타냅니다. + + + 백업 운영자 그룹과 일치하는 SID를 나타냅니다. + + + 도메인 계정과 일치하는 SID를 나타냅니다. + + + 게스트 계정과 일치하는 SID를 나타냅니다. + + + 사용자가 들어오는 포리스트 트러스트를 만들 수 있도록 하는 SID를 나타냅니다.이 SID는 포리스트의 루트 도메인에서 Incoming Forest Trust Builders 기본 제공 그룹의 멤버인 사용자 토큰에 추가됩니다. + + + 네트워크 운영자 그룹과 일치하는 SID를 나타냅니다. + + + 컴퓨터를 모니터링하는 원격 액세스 권한을 가진 사용자 그룹과 일치하는 SID를 나타냅니다. + + + 해당 컴퓨터에 성능 카운터 로깅을 예약하는 원격 액세스 권한을 가진 사용자 그룹과 일치하는 SID를 나타냅니다. + + + 고급 사용자 그룹과 일치하는 SID를 나타냅니다. + + + Windows 2000 이전 호환 가능 계정과 일치하는 SID를 나타냅니다. + + + 인쇄 운영자 그룹과 일치하는 SID를 나타냅니다. + + + 원격 데스크톱 사용자와 일치하는 SID를 나타냅니다. + + + 복제자 계정과 일치하는 SID를 나타냅니다. + + + 시스템 운영자 그룹과 일치하는 SID를 나타냅니다. + + + 기본 제공 사용자 계정과 일치하는 SID를 나타냅니다. + + + 작성자 그룹 서버 SID를 나타냅니다. + + + 개체의 작성자 그룹과 일치하는 SID를 나타냅니다. + + + 작성자 소유자 서버 SID를 나타냅니다. + + + 개체의 소유자 또는 작성자와 일치하는 SID를 나타냅니다. + + + 전화 접속 계정에 대한 SID를 나타냅니다. + + + Microsoft 다이제스트 인증 패키지가 클라이언트를 인증했을 때 존재하는 SID를 나타냅니다. + + + 엔터프라이즈 컨트롤러의 SID를 나타냅니다. + + + 대화형 계정에 대한 SID를 나타냅니다.이 SID는 대화형으로 로그온할 때 토큰의 프로세스에 추가됩니다. + + + 로컬 서비스와 일치하는 SID를 나타냅니다. + + + 로컬 SID를 나타냅니다. + + + 로컬 시스템과 일치하는 SID를 나타냅니다. + + + 로그온 ID와 일치하는 SID를 나타냅니다. + + + + 열거형에 정의된 최대 SID를 나타냅니다. + + + 네트워크 서비스와 일치하는 SID를 나타냅니다. + + + 네트워크 계정에 대한 SID를 나타냅니다.이 SID는 네트워크에서 로그온할 때 토큰의 프로세스에 추가됩니다. + + + Windows NT 권한에 대한 SID를 나타냅니다. + + + Microsoft NTLM 인증 패키지가 클라이언트를 인증했을 때 존재하는 SID를 나타냅니다. + + + Null SID를 나타냅니다. + + + 선택적 인증 옵션이 설정되어 있는 포리스트에서 사용자가 인증했을 때 존재하는 SID를 나타냅니다.이 SID가 있으면 가 존재할 수 없습니다. + + + 프록시 SID를 나타냅니다. + + + 원격 로그온과 일치하는 SID를 나타냅니다. + + + 제한된 코드에 대한 SID를 나타냅니다. + + + 보안 채널(SSL/TLS) 인증 패키지가 클라이언트를 인증했을 때 존재하는 SID를 나타냅니다. + + + 자신에 대한 SID를 나타냅니다. + + + 서비스에 대한 SID를 나타냅니다.이 SID는 서비스로 로그온할 때 토큰의 프로세스에 추가됩니다. + + + 터미널 서버 계정과 일치하는 SID를 나타냅니다. + + + 선택적 인증 옵션이 설정되어 있지 않은 트러스트나 포리스트 내에서 사용자가 인증했을 때 존재하는 SID를 나타냅니다.이 SID가 있으면 가 존재할 수 없습니다. + + + 터미널 서버 라이센스를 발급할 수 있는 SID가 서버에 있음을 나타냅니다. + + + 모든 사람과 일치하는 SID를 나타냅니다. + + + + 에 사용될 일반 역할을 지정합니다. + + + 계정 운영자는 컴퓨터나 도메인에 있는 사용자 계정을 관리합니다. + + + 관리자는 컴퓨터나 도메인에 대한 무제한적인 모든 액세스 권한을 가지고 있습니다. + + + 백업 운영자는 파일의 백업 및 복원을 목적으로 하는 보안 제한을 재정의할 수 있습니다. + + + 게스트는 사용자보다 제한을 많이 받습니다. + + + 고급 사용자는 일부 제한이 있지만 대부분의 관리 권한을 가지고 있으므로인증된 응용 프로그램 외에도 이전 응용 프로그램을 실행할 수 있습니다. + + + 인쇄 운영자는 프린터를 제어할 수 있습니다. + + + 복제기는 도메인 내의 파일 복제를 지원합니다. + + + 시스템 운영자는 특정 컴퓨터를 관리합니다. + + + 사용자는 실수나 고의로 시스템 구성을 변경할 수 없으며인증된 응용 프로그램은 실행할 수 있지만 대부분의 이전 응용 프로그램은 실행할 수 없습니다. + + + Windows 사용자를 나타냅니다. + + + 지정된 Windows 계정 토큰이 나타내는 사용자에 대해 클래스의 새 인스턴스를 초기화합니다. + 코드를 실행하고 있는 사용자를 나타내는 계정 토큰입니다. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + 지정된 Windows 계정 토큰 및 지정된 인증 형식이 나타내는 사용자에 대한 클래스의 새 인스턴스를 초기화합니다. + 코드를 실행하고 있는 사용자를 나타내는 계정 토큰입니다. + 정보 전달만을 목적으로 합니다. 사용자를 식별하는 데 사용되는 인증 형식입니다.자세한 내용은 설명 부분을 참조하세요. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [보안 중요] 이 인스턴스의 이 을 가져옵니다. + + 를 반환합니다. + + + + 에서 사용하는 모든 리소스를 해제합니다. + + + + 에서 사용하는 관리되지 않는 리소스를 해제하고 관리되는 리소스를 선택적으로 해제할 수 있습니다. + 관리되는 리소스와 관리되지 않는 리소스를 모두 해제하려면 true로 설정하고, 관리되지 않는 리소스만 해제하려면 false로 설정합니다. + + + 코드에서 익명의 사용자를 나타내는 데 센티널 값으로 사용할 수 있는 개체를 반환합니다.속성 값은 Windows 운영 체제에서 사용하는 익명의 기본 ID를 나타내지 않습니다. + 익명 사용자를 나타내는 개체입니다. + + + 현재 Windows 사용자를 나타내는 개체를 반환합니다. + 현재 사용자를 나타내는 개체입니다. + The caller does not have the correct permissions. + + + + + + + 매개 변수의 값에 따라 스레드나 프로세스에 대한 Windows ID를 나타내는 개체를 반환합니다. + Windows 사용자를 나타내는 개체입니다. + 스레드가 현재 가장하고 있는 경우에만 를 반환하려면 true이고, 스레드가 가장하고 있는 경우 스레드의 를 반환하거나 스레드가 현재 가장하고 있지 않은 경우 프로세스의 를 반환하려면 false입니다. + + + + + + 지정한 희망 토큰 액세스 수준을 사용하여 현재 Windows 사용자를 나타내는 개체를 반환합니다. + 현재 사용자를 나타내는 개체입니다. + 열거형 값의 비트 조합입니다. + + + + + + 현재 Windows 사용자가 속해 있는 그룹을 가져옵니다. + 현재 Windows 사용자가 속해 있는 그룹을 나타내는 개체입니다. + + + 사용자의 가장 수준을 가져옵니다. + 가장 수준을 지정하는 열거형 값 중 하나입니다. + + + 사용자 계정이 시스템에서 익명 계정으로 식별되는지를 나타내는 값을 가져옵니다. + 사용자 계정이 익명 계정이면 true이고, 그렇지 않으면 false입니다. + + + 사용자 계정이 시스템에서 계정으로 식별되는지 여부를 나타내는 값을 가져옵니다. + 사용자 계정이 계정이면 true이고, 그렇지 않으면 false입니다. + + + 사용자 계정이 시스템에서 계정으로 식별되는지 여부를 나타내는 값을 가져옵니다. + 사용자 계정이 계정이면 true이고, 그렇지 않으면 false입니다. + + + 토큰 소유자의 SID(보안 식별자)를 가져옵니다. + 토큰 소유자에 대한 개체입니다. + + + 가장된 Windows ID로 지정된 작업을 실행합니다.가장된 메서드 호출을 사용하여 에서 함수를 실행하지 않고 를 사용하여 매개 변수로 직접 함수를 제공할 수 있습니다. + 가장 Windows ID의 SafeAccessTokenHandle입니다. + 실행할 System.Action입니다. + + + 가장된 Windows ID로 지정된 함수를 실행합니다.가장된 메서드 호출을 사용하여 에서 함수를 실행하지 않고 를 사용하여 매개 변수로 직접 함수를 제공할 수 있습니다. + 함수 결과를 반환합니다. + 가장 Windows ID의 SafeAccessTokenHandle입니다. + 실행할 System.Func입니다. + 함수에서 사용되고 반환되는 개체의 형식입니다. + + + 사용자의 SID(보안 식별자)를 가져옵니다. + 사용자에 대한 개체입니다. + + + 코드에서 Windows 사용자의 Windows 그룹 멤버 자격을 확인할 수 있습니다. + + + 지정된 개체를 사용하여 클래스의 새 인스턴스를 초기화합니다. + + 의 새 인스턴스를 만들 개체입니다. + + 가 null입니다. + + + 현재 보안 주체가 지정된 RID(상대 식별자)를 갖는 Windows 사용자 그룹에 속하는지 여부를 확인합니다. + 현재 보안 주체가 지정된 Windows 사용자 그룹의 멤버이면, 즉 특정 역할에 속해 있으면 true이고, 그렇지 않으면 false입니다. + 보안 주체의 멤버 자격 상태를 확인하는 데 사용되는 Windows 사용자 그룹의 RID입니다. + + + + + + 현재 보안 주체가 지정된 SID(보안 식별자)를 갖는 Windows 사용자 그룹에 속하는지 여부를 확인합니다. + 현재 보안 주체가 지정된 Windows 사용자 그룹의 멤버이면 true이고, 그렇지 않으면 false입니다. + Windows 사용자 그룹을 고유하게 식별하는 입니다. + + 가 null입니다. + Windows에서 Win32 오류를 반환한 경우 + + + + + + 현재 보안 주체가 지정된 을 갖는 Windows 사용자 그룹에 속하는지 여부를 확인합니다. + 현재 보안 주체가 지정된 Windows 사용자 그룹의 멤버이면 true이고, 그렇지 않으면 false입니다. + + 값 중 하나입니다. + + 은(는) 올바른 값이 아닙니다. + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ru/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ru/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..25d400e --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/ru/System.Security.Principal.Windows.xml @@ -0,0 +1,725 @@ + + + + System.Security.Principal.Windows + + + + [SECURITY CRITICAL] Предоставляет безопасный дескриптор для потока Windows или маркера доступа процесса.Дополнительные сведения см. в разделе Маркеры доступа. + + + [SECURITY CRITICAL] Инициализирует новый экземпляр класса . + Объект , представляющий ранее существующий дескриптор для использования.Используя , возвращает недопустимый дескриптор. + + + [SECURITY CRITICAL] Возвращает недопустимый дескриптор путем создания экземпляра объекта с . + Возвращает объект . + + + [SECURITY CRITICAL] Получает значение, указывающее, является ли дескриптор недействительным. + Значение true, если дескриптор недействителен, в противном случае — значение false. + + + Представляет исключение для участника, удостоверение которого невозможно сопоставить известному удостоверению. + + + Инициализирует новый экземпляр класса . + + + Инициализирует новый экземпляр класса , используя указанное сообщение об ошибке. + Сообщение об ошибке с объяснением причин исключения. + + + Инициализирует новый экземпляр класса , используя указанные сообщение об ошибке и внутреннее исключение. + Сообщение об ошибке с объяснением причин исключения. + Исключение, которое вызвало текущее исключение.Если значение параметра отличается от null, текущее исключение выдается в блоке catch, обрабатывающем внутреннее исключение. + + + Представляет коллекцию несопоставленных удостоверений для исключения . + Коллекция несопоставленных удостоверений. + + + Представляет удостоверение и является базовым классом для классов и .Этот класс не предоставляет открытый конструктор и поэтому не может быть унаследованным. + + + Возвращает значение, показывающее, является ли указанный тип допустимым типом преобразования для класса . + true, если является объектом тех же базового типа и значения, что и данный экземпляр ; в противном случае — false. + Объект, сравниваемый с данным экземпляром , или пустая ссылка. + + + Служит хэш-функцией для .Метод подходит для использования в алгоритмах хэширования и структурах данных, таких как хэш-таблицы. + Хэш-код для данного объекта . + + + Возвращает значение, показывающее, является ли указанный тип допустимым типом преобразования для класса . + Значение true, если является допустимым типом преобразования для класса ; в противном случае — значение false. + Тип, допустимость использования которого в качестве типа преобразования из класса требуется проверить.Допустимы следующие типы целевого объекта: + + + Сравнивает два объекта на равенство.Объекты считаются равными, если их каноническое представление имени совпадает с представлением, возвращаемым свойством , или значения обоих объектов равны null. + true, если значения и равны; в противном случае — false. + Левый операнд , используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + Правый операнд , используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + + + Сравнивает два объекта на неравенство.Объекты считаются неравными, если их канонические представления имени отличаются от представления, возвращаемого свойством , или один из объектов имеет значение null, а другой объект имеет другое значение. + Значение true, если значения параметров и не равны; в противном случае — значение false. + Левый операнд , используемый для сравнения в отношении неравенства.Этот параметр может иметь значение null. + Правый операнд , используемый для сравнения на неравенство.Этот параметр может иметь значение null. + + + Возвращает строковое представление удостоверения, представленного объектом . + Удостоверение в строковом формате. + + + Преобразует имя учетной записи, представленное объектом , в другой тип, производный от . + Преобразованное удостоверение. + Тип целевого объекта для преобразования из объекта . + + + Получает строковое значение удостоверения, представленного объектом . + Строковое значение удостоверения, представленного объектом . + + + Представляет коллекцию объектов и обеспечивает средства преобразования наборов объектов, производных от , в типы, производные от . + + + Инициализирует новый экземпляр класса нулевыми элементами в коллекции. + + + Инициализирует новый экземпляр класса , используя заданный исходный размер. + Исходное число элементов в коллекции.Значение параметра служит только в качестве подсказки; необязательно создается максимальное число элементов. + + + Добавляет объект в коллекцию . + Объект для добавления в коллекцию. + + + Удаляет все объекты из коллекции . + + + Указывает, содержит ли коллекция заданный объект . + Значение true, если коллекция содержит заданный объект. + Объект для проверки. + + + Копирует коллекцию в массив , начиная с указанного индекса. + Объект массива , в который должна быть скопирована коллекция . + Отсчитываемый от нуля индекс в массиве , который обозначает позицию для копирования коллекции . + + + Возвращает число элементов в коллекции . + Число объектов в коллекции . + + + Возвращает перечислитель, который может использоваться для выполнения итерации по коллекции . + Перечислитель для коллекции . + + + Устанавливает или возвращает узел по заданному индексу коллекции . + Объект , содержащийся в коллекции по указанному индексу.Если значение параметра больше или равно числу узлов в коллекции, возвращается значение null. + Отсчитываемый от нуля индекс в коллекции . + + + Удаляет указанный объект из коллекции. + Значение true, если заданный объект был удален из коллекции. + Удаляемый объект . + + + + Возвращает перечислитель, который может использоваться для выполнения итерации по коллекции . + Перечислитель для коллекции . + + + Преобразует объекты коллекции в указанный тип.Этот метод вызывается так же, как метод со значением false второго параметра. Это означает, что для элементов, преобразование которых завершается неудачно, исключения выдаваться не будут. + Коллекция , представляющая преобразованное содержимое исходной коллекции. + Тип, в который преобразуются элементы коллекции. + + + + + + Преобразует объекты коллекции в указанный тип и использует заданную отказоустойчивость для обработки или игнорирования ошибок, связанных с типом, не имеющим сопоставление преобразования. + Коллекция , представляющая преобразованное содержимое исходной коллекции. + Тип, в который преобразуются элементы коллекции. + Логическое значение, определяющее способ обработки ошибок преобразования.Если параметр имеет значение true, ошибки преобразования из-за необнаружения сопоставления во время преобразования приводят к сбою преобразования и вызову исключений.Если параметр имеет значение false, типы, которые не удалось преобразовать из-за необнаружения сопоставления во время преобразования, копируются в возвращаемую коллекцию без преобразования. + + + + + + Представляет учетную запись пользователя или группы. + + + Инициализирует новый экземпляр класса , используя указанное имя. + Имя, используемое для создания объекта .Этот параметр не может иметь значение null или являться пустой строкой. + Параметр имеет значение null. + Параметр содержит пустую строку.– или –Параметр имеет слишком большую длину. + + + Инициализирует новый экземпляр класса , используя указанные имя домена и имя учетной записи. + Имя домена.Этот параметр может иметь значение null или являться пустой строкой.Имена доменов, имеющие значения NULL, обрабатываются аналогично пустой строке. + Имя учетной записи.Этот параметр не может иметь значение null или являться пустой строкой. + Параметр имеет значение null. + Параметр содержит пустую строку.– или –Параметр имеет слишком большую длину.– или –Параметр имеет слишком большую длину. + + + Возвращает значение, показывающее, равен ли данный объект указанному объекту. + true, если является объектом того же базового типа и значения, что и данный объект ; в противном случае — false. + Объект, сравниваемый с данным объектом , или значение null. + + + Служит хэш-функцией для текущего объекта .Метод подходит для алгоритмов хэширования и структур данных, таких как хэш-таблицы. + Хэш-значение для текущего объекта . + + + Возвращает значение, показывающее, является ли указанный тип допустимым типом преобразования для класса . + true, если является допустимым типом преобразования для класса ; в противном случае — false. + Тип, допустимость использования которого в качестве типа преобразования из класса требуется проверить.Допустимы следующие типы целевого объекта:- - + + + Сравнивает два объекта на равенство.Объекты считаются равными, если их каноническое представление имени совпадает с представлением, возвращаемым свойством , или значения обоих объектов равны null. + true, если и равны; в ином случае — false. + Левый операнд, используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + Правый операнд, используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + + + Сравнивает два объекта на неравенство.Объекты считаются неравными, если их канонические представления имени отличаются от представления, возвращаемого свойством , или один из объектов имеет значение null, а другой объект имеет другое значение. + true, если и не равны; в ином случае — false. + Левый операнд, используемый для сравнения в отношении неравенства.Этот параметр может иметь значение null. + Правый операнд, используемый для сравнения в отношении неравенства.Этот параметр может иметь значение null. + + + Возвращает имя учетной записи в формате Домен\Учетная запись для учетной записи, представленной объектом . + Имя учетной записи в формате Домен\Учетная запись. + + + Преобразует имя учетной записи, представленное объектом , в другой тип, производный от . + Преобразованное удостоверение. + Тип целевого объекта для преобразования из объекта .Типом целевого объекта должен быть тип, допустимый для использования в качестве аргумента метода . + Значение параметра — null. + + не является типом . + Некоторые или ссылки на свойства нельзя преобразовать. + Исходное имя учетной записи слишком длинное.– или –Возвращен код ошибки Win32. + + + + + + Возвращает строковое представление (в верхнем регистре) данного объекта . + Строковое представление (в верхнем регистре) данного объекта . + + + + + + Представляет идентификатор безопасности (SID) и предоставляет операции маршалинга и сравнения для SID. + + + Инициализирует новый экземпляр класса , используя указанное двоичное представление идентификатора безопасности (ИД безопасности). + Массив байтов, представляющий ИД безопасности. + Смещение в байтах, которое должно использоваться в качестве начального индекса в параметре . + + + Инициализирует новый экземпляр класса , используя целое число, представляющее двоичную форму идентификатора безопасности (ИД безопасности). + Целое число, представляющее двоичную форму ИД безопасности. + + + Инициализирует новый экземпляр класса , используя указанные хорошо известный тип идентификатора безопасности (ИД безопасности) и ИД безопасности домена. + Одно из значений перечисления.Это значение не должно быть равно . + ИД безопасности домена.Это значение требуется для указанных ниже значений .Для любых других значений данный параметр игнорируется.- - - - - - - - - - - - - + + + Инициализирует новый экземпляр класса , используя указанный идентификатор безопасности (ИД безопасности) в формате SDDL (Security Descriptor Definition Language). + Строка SDDL для идентификатора безопасности, используемого для создания объекта . + + + Возвращает часть идентификатора безопасности (ИД безопасности) домена учетных записей из ИД безопасности, представленного объектом , если этот ИД безопасности представляет ИД безопасности учетной записи Windows.Если данный ИД безопасности не представляет ИД безопасности учетной записи Windows, это свойство возвращает . + Часть ИД безопасности домена учетных записей из ИД безопасности, представленного объектом , если этот ИД безопасности представляет ИД безопасности учетной записи Windows; в противном случае возвращается . + + + Возвращает длину (в байтах) идентификатора безопасности (ИД безопасности), представленного объектом . + Длина (в байтах) ИД безопасности, представленного объектом . + + + Сравнивает текущий объект с заданным объектом . + Знаковое число, представляющее относительные значения этого экземпляра и параметра .Возвращаемое значение Описание Меньше нуля Данный экземпляр меньше . Zero Этот экземпляр и параметр равны. Больше нуля. Этот экземпляр больше параметра . + Объект, который требуется сравнить с текущим объектом. + + + Возвращает значение, показывающее, равен ли данный объект указанному объекту. + true, если является объектом того же базового типа и значения, что и данный объект ; в противном случае — false. + Объект, сравниваемый с данным объектом , или значение null. + + + Показывает, равен ли заданный объект текущему объекту . + true, если значение равно значению текущего объекта . + Объект, который требуется сравнить с текущим объектом. + + + Копирует двоичное представление указанного идентификатора безопасности (ИД безопасности), представленного классом , в массив байтов. + Массив байтов для копируемого ИД безопасности. + Смещение в байтах, которое должно использоваться в качестве начального индекса в параметре . + + + Служит хэш-функцией для текущего объекта .Метод подходит для алгоритмов хэширования и структур данных, таких как хэш-таблицы. + Хэш-значение для текущего объекта . + + + Возвращает значение, показывающее, является ли идентификатор безопасности (ИД безопасности), представленный данным объектом , допустимым ИД безопасности учетной записи Windows. + true, если ИД безопасности, представленный данным объектом , является допустимым ИД безопасности учетной записи Windows; в противном случае — false. + + + Возвращает значение, показывающее, относится ли идентификатор безопасности (ИД безопасности), представленный данным объектом , к тому же домену, что и заданный ИД безопасности. + true, если ИД безопасности, представленный данным объектом , относится к тому же домену, что и ИД безопасности ; в противном случае — false. + ИД безопасности, который требуется сравнить с данным объектом . + + + Возвращает значение, показывающее, является ли указанный тип допустимым типом преобразования для класса . + true, если является допустимым типом преобразования для класса ; в противном случае — false. + Тип, допустимость использования которого в качестве типа преобразования из класса требуется проверить.Допустимы следующие типы целевого объекта:- - + + + Возвращает значение, показывающее, соответствует ли объект заданному хорошо известному типу идентификатора безопасности (ИД безопасности). + true, если — тип ИД безопасности для объекта ; в противном случае — false. + Значение, которое требуется сравнить с объектом . + + + Возвращает максимальный размер (в байтах) двоичного представления идентификатора безопасности. + + + Возвращает минимальный размер (в байтах) двоичного представления идентификатора безопасности. + + + Сравнивает два объекта на равенство.Объекты считаются равными, если их каноническое представление совпадает с представлением, возвращаемым свойством , или оба объекта имеют значение null. + true, если значения и равны; в противном случае — false. + Левый операнд, используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + Правый операнд, используемый для сравнения в отношении равенства.Этот параметр может иметь значение null. + + + Сравнивает два объекта на неравенство.Объекты считаются неравными, если их канонические представления имени отличаются от представления, возвращаемого свойством , или один из объектов имеет значение null, а другой объект имеет другое значение. + Значение true, если значения параметров и не равны; в противном случае — значение false. + Левый операнд, используемый для сравнения в отношении неравенства.Этот параметр может иметь значение null. + Правый операнд, используемый для сравнения в отношении неравенства.Этот параметр может иметь значение null. + + + Возвращает идентификатор безопасности (ИД безопасности) в формате SDDL (Security Descriptor Definition Language) для учетной записи, представленной объектом .Пример формата SDDL — S-1-5-9. + ИД безопасности в формате SDDL для учетной записи, представленной объектом . + + + Преобразует имя учетной записи, представленной объектом , в другой тип, производный от . + Преобразованное удостоверение. + Тип целевого объекта для преобразования из объекта .Типом целевого объекта должен быть тип, допустимый для использования в качестве аргумента метода . + Значение параметра — null. + + не является типом . + Некоторые или ссылки на свойства нельзя преобразовать. + Возвращен код ошибки Win32. + + + + + + Возвращает строку символов в верхнем регистре в формате SDDL (Security Descriptor Definition Language) для идентификатора безопасности (ИД безопасности), представленного данным объектом . + Строка символов в верхнем регистре в формате SDDL для ИД безопасности, представленного объектом . + + + + + + Определяет привилегии учетной записи пользователя, связанной с маркером доступа. + + + Пользователь может изменить для маркера владельца по умолчанию, основную группу или список управления доступом на уровне пользователей (DACL). + + + Пользователь может изменить атрибуты групп в маркере. + + + Пользователь может включить или отключить привилегии в маркере. + + + Пользователь может изменить идентификатор сеанса маркера. + + + Пользователь имеет полный доступ к маркеру. + + + Пользователь может присоединить основной маркер к процессу. + + + Пользователь может дублировать маркер. + + + Пользователь может олицетворять клиента. + + + Максимальное значение, которое может быть назначено для перечисления . + + + Пользователь может запросить маркер. + + + Пользователь может запросить источник маркера. + + + Пользователь имеет обычные права чтения и привилегию для маркера. + + + Пользователь имеет обычные права записи и привилегии и для маркера. + + + Определяет набор часто используемых идентификаторов безопасности (SID). + + + Идентификатор безопасности, соответствующий группе учетных записей администраторов. + + + Идентификатор безопасности, соответствующий группе администраторов сертификатов. + + + Идентификатор безопасности, соответствующий группе учетных записей компьютеров. + + + Идентификатор безопасности, соответствующий группе учетных записей контроллеров. + + + Идентификатор безопасности, соответствующий группе учетных записей администраторов домена. + + + Идентификатор безопасности, соответствующий группе учетных записей гостей домена. + + + Идентификатор безопасности, соответствующий группе учетных записей пользователей домена. + + + Идентификатор безопасности, соответствующий группе администраторов предприятия. + + + Идентификатор безопасности, соответствующий группе учетных записей гостей. + + + Идентификатор безопасности, соответствующий группе учетных записей целевых объектов Kerberos. + + + Идентификатор безопасности, соответствующий группе администраторов политик. + + + Идентификатор безопасности, соответствующий учетной записи серверов RAS и IAS. + + + Идентификатор безопасности, соответствующий группе администраторов схемы. + + + Идентификатор безопасности для анонимной учетной записи. + + + Идентификатор безопасности для прошедшего проверку пользователя. + + + Идентификатор безопасности для процесса пакетной обработки.Этот идентификатор добавляется в процесс маркера, когда он входит в систему в качестве пакетного задания. + + + Идентификатор безопасности, соответствующий учетной записи операторов учета. + + + Идентификатор безопасности, соответствующий учетной записи администратора. + + + Идентификатор безопасности, соответствующий группе авторизации доступа Windows. + + + Идентификатор безопасности, соответствующий группе операторов архива. + + + Идентификатор безопасности, соответствующий учетной записи домена. + + + Идентификатор безопасности, соответствующий учетной записи "Гость". + + + Идентификатор безопасности, позволяющий пользователю создавать входящие доверия лесов.Этот идентификатор добавляется в маркер пользователей, являющихся членами встроенной группы "Создатели входящего доверия леса" в корневом домене леса. + + + Идентификатор безопасности, соответствующий группе операторов сети. + + + Указывает идентификатор безопасности, соответствующий группе пользователей, которые имеют доступ к мониторингу компьютера. + + + Указывает идентификатор безопасности, соответствующий группе пользователей, которые имеют доступ к планированию записи в журнал счетчиков производительности на данном компьютере. + + + Идентификатор безопасности, соответствующий группе опытных пользователей. + + + Идентификатор безопасности, соответствующий учетным записям, совместимым с пред-Windows 2000. + + + Идентификатор безопасности, соответствующий группе операторов печати. + + + Идентификатор безопасности, соответствующий пользователям удаленного рабочего стола. + + + Идентификатор безопасности, соответствующий учетной записи "Репликатор". + + + Идентификатор безопасности, соответствующий группе системных операторов. + + + Идентификатор безопасности, соответствующий встроенным учетным записям пользователей. + + + Идентификатор безопасности группы-создателя "сервер". + + + Идентификатор безопасности, соответствующий группе-создателю объекта. + + + Идентификатор безопасности владельца-создателя "сервер". + + + Идентификатор безопасности, соответствующий владельцу или создателю объекта. + + + Идентификатор безопасности для учетной записи удаленного подключения. + + + Идентификатор безопасности, присутствующий после проверки подлинности клиента пакетом дайджест-проверки подлинности Microsoft. + + + Идентификатор безопасности для контроллера предприятия. + + + Идентификатор безопасности для интерактивной учетной записи.Этот идентификатор добавляется в процесс маркера, когда он входит в систему интерактивно. + + + Идентификатор безопасности, соответствующий локальной службе. + + + Локальный идентификатор безопасности. + + + Идентификатор безопасности, соответствующий локальной системе. + + + Идентификатор безопасности, соответствующий идентификаторам входа. + + + Максимальный определенный идентификатор безопасности в перечислении . + + + Идентификатор безопасности, соответствующий сетевой службе. + + + Идентификатор безопасности для сетевой учетной записи.Этот идентификатор добавляется в процесс маркера, когда он входит в систему по сети. + + + Идентификатор безопасности для центра Windows NT. + + + Идентификатор безопасности, присутствующий после проверки подлинности клиента пакетом проверки подлинности Microsoft NTLM. + + + Пустой идентификатор безопасности. + + + Идентификатор безопасности, присутствующий после прохождения пользователем проверки подлинности через лес с включенной функцией выборочной проверки подлинности.При наличии идентификатора безопасности идентификатор присутствовать не может. + + + Идентификатор безопасности прокси-сервера. + + + Идентификатор безопасности, соответствующий удаленным входам в систему. + + + Идентификатор безопасности для запрещенного кода. + + + Идентификатор безопасности, присутствующий после проверки подлинности клиента пакетом проверки подлинности по безопасному каналу (SSL/TLS). + + + Идентификатор безопасности для самообслуживания. + + + Идентификатор безопасности для службы.Этот идентификатор добавляется в процесс маркера, когда он входит в систему в качестве службы. + + + Идентификатор безопасности, соответствующий учетной записи сервера терминалов. + + + Идентификатор безопасности, присутствующий после прохождения пользователем проверки подлинности изнутри леса или через уровень доверия, не имеющий включенной функции выборочной проверки подлинности.При наличии этого идентификатора идентификатор присутствовать не может. + + + Идентификатор безопасности, присутствующий на сервере, который может выдавать лицензии для сервера терминалов. + + + Идентификатор безопасности, соответствующий любому объекту. + + + Задает основные роли, используемые в методе . + + + Операторы учетных записей осуществляют управление учетными записями пользователей на компьютере или в домене. + + + Администраторы обладают полным и неограниченным доступом к компьютеру или домену. + + + Операторы архива могут переопределять ограничения по безопасности для конкретных целей (резервное копирование или восстановление файлов). + + + Для пользователей с гостевой учетной записью существует больше ограничений, чем для обычных пользователей. + + + Опытным пользователям предоставлено большинство административных прав с некоторыми ограничениями.Поэтому наряду с сертифицированными приложениями опытные пользователи могут запускать приложения прежних версий. + + + Операторы печати могут управлять принтером. + + + Репликаторы поддерживают репликацию файлов в домене. + + + Системные операторы управляют определенным компьютером. + + + Обычным пользователям не разрешено вносить в систему случайные или преднамеренные изменения.Поэтому обычные пользователи могут запускать только сертифицированные приложения. Запуск большинства приложений прежних версий им запрещен. + + + Представляет пользователя Windows. + + + Инициализирует новый экземпляр класса для пользователя, представленного заданным токеном учетной записи Windows. + Токен учетной записи для пользователя, от лица которого выполняется код. + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + Инициализирует новый экземпляр класса для пользователя, представленного заданным токеном учетной записи Windows и заданным типом проверки подлинности. + Токен учетной записи для пользователя, от лица которого выполняется код. + (Использовать только для справки.) Тип проверки подлинности, применяемой для идентификации пользователя.Дополнительные сведения см. в разделе "Замечания". + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [SECURITY CRITICAL] Возвращает объект для данного экземпляра . + Возвращает значение типа . + + + Освобождает все ресурсы, занятые модулем . + + + Освобождает неуправляемые ресурсы, используемые объектом , а при необходимости освобождает также управляемые ресурсы. + Значение true позволяет освободить как управляемые, так и неуправляемые ресурсы; значение false освобождает только неуправляемые ресурсы. + + + Возвращает объект , который можно использовать в качестве контрольного значения в коде, чтобы представлять анонимного пользователя.Значение свойства не представляет встроенный анонимный идентификатор, используемый операционной системой Windows. + Объект, представляющий анонимного пользователя. + + + Возвращает объект , представляющий текущего пользователя Windows. + Объект, представляющий текущего пользователя. + The caller does not have the correct permissions. + + + + + + Возвращает объект , представляющий идентификатор Windows для потока или процесса в зависимости от значения параметра . + Объект, представляющий пользователя Windows. + Значение true для возврата объекта , только если олицетворение потока выполняется в данный момент; значение false для возврата объекта потока, если олицетворение потока выполняется, или объекта процесса, если олицетворение потока в настоящий момент не выполняется. + + + + + + Возвращает объект , представляющий текущего пользователя Windows, используя указанный требуемый уровень доступа к токену. + Объект, представляющий текущего пользователя. + Побитовое сочетание значений перечисления. + + + + + + Возвращает группы, к которым относится текущий пользователь Windows. + Объект, представляющий группы, к которым принадлежит текущий пользователь Windows. + + + Возвращает уровень олицетворения для пользователя. + Одно из значений перечисления, указывающее уровень олицетворения. + + + Возвращает значение, показывающее, определена ли в системе учетная запись пользователя как анонимная. + Значение true, если учетная запись пользователя является анонимной; в противном случае — значение false. + + + Возвращает значение, показывающее, определена ли в системе учетная запись пользователя как учетная запись . + Значение true, если учетная запись пользователя является учетной записью ; в противном случае — значение false. + + + Возвращает значение, показывающее, определена ли в системе учетная запись пользователя как учетная запись . + Значение true, если учетная запись пользователя является учетной записью ; в противном случае — значение false. + + + Возвращает идентификатор безопасности (ИД безопасности) для владельца токена. + Объект для владельца токена. + + + Выполняет указанное действие с олицетворенным удостоверением Windows.Вместо олицетворенного вызова метода и выполнения функции в контексте можно использовать метод и предоставить функцию непосредственно в качестве параметра. + Дескриптор SafeAccessTokenHandle олицетворенного удостоверения Windows. + System.Action для запуска. + + + Выполняет указанную функцию с олицетворенным удостоверением Windows.Вместо олицетворенного вызова метода и выполнения функции в контексте можно использовать метод и предоставить функцию непосредственно в качестве параметра. + Возвращает результат функции. + Дескриптор SafeAccessTokenHandle олицетворенного удостоверения Windows. + System.Func для запуска. + Тип объекта, который используется и возвращается функцией. + + + Возвращает идентификатор безопасности (ИД безопасности) для пользователя. + Объект для пользователя. + + + Включает код для проверки членства пользователя Windows в группе Windows. + + + Инициализирует новый экземпляр класса указанным объектом . + Объект, из которого создается новый экземпляр . + Параметр имеет значение null. + + + Определяет, относится ли текущий участник к группе пользователей Windows с заданным относительным идентификатором (RID). + Значение true, если текущий субъект является членом заданной группы пользователей Windows (в конкретной роли); в противном случае — значение false. + RID группы пользователей Windows, в которой требуется проверить состояние членства участника. + + + + + + Определяет, относится ли текущий субъект к группе пользователей Windows с заданным идентификатором безопасности (SID). + Значение true, если текущий участник является членом заданной группы пользователей Windows; в противном случае — значение false. + Объект , уникально определяющий группу пользователей Windows. + Параметр имеет значение null. + Система Windows возвратила код ошибки Win32. + + + + + + Определяет, относится ли текущий субъект к группе пользователей Windows с заданным . + Значение true, если текущий участник является членом заданной группы пользователей Windows; в противном случае — значение false. + Одно из значений . + + не является допустимым значением . + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hans/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hans/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..712031f --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hans/System.Security.Principal.Windows.xml @@ -0,0 +1,742 @@ + + + + System.Security.Principal.Windows + + + + [SECURITY CRITICAL] 提供 Windows 线程或进程访问令牌的安全句柄。有关详细信息,请参阅访问令牌 + + + [SECURITY CRITICAL] 初始化 类的新实例。 + + 对象,表示要使用的预先存在的句柄。使用 返回无效句柄。 + + + [SECURITY CRITICAL] 通过使用 实例化 对象来返回无效句柄。 + 返回 对象。 + + + [SECURITY CRITICAL] 获取一个值,该值指示句柄是否无效。 + 如果句柄无效,则为 true;否则为 false。 + + + 表示其标识未能映射到已知标识的主体的一个异常。 + + + 初始化 类的新实例。 + + + 使用指定的错误消息初始化 类的新实例。 + 解释异常原因的错误信息。 + + + 使用指定的错误消息和内部异常初始化 类的新实例。 + 解释异常原因的错误信息。 + 导致当前异常的异常。如果 不为空,则在处理内部异常的 catch 块中引发当前异常。 + + + 表示 异常的未映射标识的集合。 + 未映射标识的集合。 + + + 表示一个标识,为 类的基类。此类不提供公共构造函数,因为不能被继承。 + + + 返回一个值,该值指示指定对象是否等于 类的此实例。 + 如果 是与此 实例有相同基础类型和值的对象,则为 true;否则为 false。 + 要与此 实例比较的对象,或一个空引用。 + + + 作为 的哈希函数。 适用于哈希算法和哈希表之类的数据结构。 + 对象的哈希代码。 + + + 返回一个值,该值指示指定类型是否为 类的有效转换类型。 + 如果 类的有效转换类型,则为 true;否则为 false。 + 查询其能否作为 的有效转换类型的类型。以下目标类型是有效的: + + + 比较两个 对象以确定它们是否相等。如果这两个对象具有与 属性返回的规范名称表示形式相同的规范名称表示形式,或是都为 null,则将它们视为相等。 + 如果 相等,则为 true;否则为 false。 + 用于相等比较的左 操作数。此参数可以为 null。 + 用于相等比较的右 操作数。此参数可以为 null。 + + + 比较两个 对象以确定它们是否不相等。如果它们的规范名称表示形式与 属性返回的表示形式不同,或其中一个对象为 null 而另一个对象不是,它们将被视为不相等。 + 如果 不相等,则为 true;否则为 false。 + 用于不相等比较的左 操作数。此参数可以为 null。 + 用于不相等比较的右 操作数。此参数可以为 null。 + + + 返回 对象表示的标识的字符串表示形式。 + 字符串格式的标识。 + + + 对象表示的帐户名转换为另一 派生类型。 + 转换后的标识。 + 进行的转换的目标类型。 + + + 获取 对象表示的标识的字符串值。 + + 对象表示的标识的字符串值。 + + + 表示 对象的集合,并提供一种方法将 派生的对象集转换为 派生的类型。 + + + 用集合中的零项初始化 类的新实例。 + + + 使用指定的初始大小初始化 类的新实例。 + 集合中的初始项数。 的值仅是一个提示,它不一定是创建的最大项数。 + + + 对象添加到 集合中。 + 要添加到集合的 对象。 + + + 集合中清除所有 对象。 + + + 指示 集合是否包含指定的 对象。 + 如果集合包含指定的对象,则为 true。 + 要检查的 对象。 + + + 从指定的索引开始,将 集合复制到一个 数组中。 + 要将 集合复制到其中的 数组对象。 + + 集合要复制到的 中从零开始的索引。 + + + 获取 集合中项的数目。 + + 集合中 对象的数目。 + + + 获取一个可用于循环访问 集合的枚举数。 + + 集合的枚举数。 + + + 获取或设置 集合中指定索引处的节点。 + 位于集合中指定索引处的 。如果 大于或等于集合中的节点数,则返回值为 null。 + + 集合中的从零开始的索引。 + + + 从集合中移除指定的 对象。 + 如果从集合中移除了指定的对象,则为 true。 + 要移除的 对象。 + + + + 获取一个可用于循环访问 集合的枚举数。 + + 集合的枚举数。 + + + 将集合中的对象转换为指定类型。调用此方法与调用第二个参数设置为 false 的 一样,这意味着对于转换失败的项不会引发异常。 + 一个 集合,表示原始集合的转换后的内容。 + 要将集合中的项转换到的目标类型。 + + + + + + 将集合中的对象转换为指定类型,并使用指定容错机制处理或忽略与不具有转换映射的类型相关联的错误。 + 一个 集合,表示原始集合的转换后的内容。 + 要将集合中的项转换到的目标类型。 + 一个布尔值,确定如何处理转换错误。如果 为 true,则由于未能为转换找到映射而发生的转换错误会导致转换失败并引发异常。如果 为 false,则因未为转换找到映射而未能转换的类型会在不进行转换的情况下被复制到返回的集合中。 + + + + + + 表示用户或组帐户。 + + + 使用指定的名称初始化 类的新实例。 + 用于创建 对象的名称。此参数不能为 null 或空字符串。 + + 为 null。 + + 是空字符串。- 或 - 过长。 + + + 使用指定的域名和帐户名初始化 类的新实例。 + 域的名称。此参数可以为 null 或空字符串。为 null 值的域名如同空字符串一样处理。 + 帐户的名称。此参数不能为 null 或空字符串。 + + 为 null。 + + 是空字符串。- 或 - 过长。- 或 - 过长。 + + + 返回一个值,该值指示此 对象是否与指定的对象相等。 + 如果 是与此 对象有相同基础类型和值的对象,则为 true;否则为 false。 + 要与此 对象比较的对象,或 null。 + + + 用作当前 对象的一个哈希函数。 方法适合在哈希算法和类似哈希表的数据结构中使用。 + 当前 对象的哈希值。 + + + 返回一个值,该值指示指定类型是否为 类的有效转换类型。 + 如果 类的有效转换类型,则为 true;否则为 false。 + 查询其能否作为 的有效转换类型的类型。以下目标类型是有效的:- - + + + 比较两个 对象以确定它们是否相等。如果这两个对象具有与 属性返回的规范名称表示形式相同的规范名称表示形式,或是都为 null,则将它们视为相等。 + 如果 相等,则为 true;否则为 false。 + 用于相等比较的左操作数。此参数可以为 null。 + 用于相等比较的右操作数。此参数可以为 null。 + + + 比较两个 对象以确定它们是否不相等。如果它们的规范名称表示形式与 属性返回的表示形式不同,或其中一个对象为 null 而另一个对象不是,它们将被视为不相等。 + 如果 不相等,则为 true;否则为 false。 + 用于不相等比较的左操作数。此参数可以为 null。 + 用于不相等比较的右操作数。此参数可以为 null。 + + + 以域\帐户 格式返回 对象所表示的帐户的帐户名。 + 域\帐户 格式的帐户名。 + + + 对象表示的帐户名转换为另一 派生的类型。 + 转换后的标识。 + 进行的转换的目标类型。目标类型必须为由 方法视为有效的类型。 + + 为 null。 + + 不是 类型。 + 未能转换部分或所有标识引用。 + 源帐户名称过长。- 或 -返回了 Win32 错误。 + + + + + + 返回此 对象的大写字符串表示形式。 + 对象的大写字符串表示形式。 + + + + + + 表示安全标识符 (SID),并提供 SID 的封送和比较操作。 + + + 使用安全标识符 (SID) 的指定二进制表示形式初始化 类的新实例。 + 表示 SID 的字节数组。 + 要用作 中的起始索引的字节偏移量。 + + + 使用表示安全标识符 (SID) 二进制形式的整数,初始化 类的新实例。 + 表示 SID 的二进制形式的整数。 + + + 使用指定的已知安全标识符 (SID) 类型和域 SID 初始化 类的新实例。 + 枚举值之一。此值不得为 。 + 域 SID。以下 值需要此值。任何其他 值都忽略此参数。- - - - - - - - - - - - - + + + 使用安全说明符定义语言 (SDDL) 格式的指定安全标识符 (SID) 初始化 类的新实例。 + 用于创建 对象的 SID 的 SDDL 字符串。 + + + 如果由 对象表示的 SID 表示 Windows 帐户 SID,则从该 SID 返回帐户域安全标识符 (SID) 部分。如果该 SID 不表示 Windows 帐户 SID,则此属性返回 + 如果由 对象表示的 SID 表示 Windows 帐户 SID,则从该 SID 返回帐户域 SID 部分;否则,它返回 + + + 返回由 对象表示的安全标识符 (SID) 的长度(以字节为单位)。 + 对象表示的 SID 的长度(以字节为单位)。 + + + 用指定的 对象同当前 对象进行比较。 + 一个有符号数字,指示此实例和 的相对值。返回值说明小于零此实例小于 。零此实例等于 。大于零此实例大于 + 要与当前对象进行比较的对象。 + + + 返回一个值,该值指示此 对象是否与指定的对象相等。 + 如果 是与此 对象有相同基础类型和值的对象,则为 true;否则为 false。 + 要与此 对象进行比较的对象,或 null。 + + + 指示指定的 对象是否等于当前的 对象。 + 如果 的值和当前 对象的值相等,则为 true。 + 要与当前对象进行比较的对象。 + + + 类表示的指定安全标识符 (SID) 的二进制表示形式复制到一个字节数组。 + 要接收复制的 SID 的字节数组。 + 要用作 中的起始索引的字节偏移量。 + + + 用作当前 对象的哈希函数。 方法适合于哈希算法和诸如哈希表的数据结构。 + 当前 对象的哈希值。 + + + 返回一个值,该值指示由此 对象表示的安全标识符 (SID) 是否为有效的 Windows 帐户 SID。 + 如果由此 对象表示的 SID 为有效 Windows 帐户 SID,则为 true;否则为 false。 + + + 返回一个值,该值指示由此 对象表示的安全标识符 (SID) 是否与指定 SID 同属一个域。 + 如果由此 对象表示的 SID 与 SID 同属一个域,则为 true;否则为 false。 + 与此 对象进行比较的 SID。 + + + 返回一个值,该值指示指定类型是否为 类的有效转换类型。 + 如果 类的有效转换类型,则为 true;否则为 false。 + 查询其能否作为 的有效转换类型的类型。以下目标类型是有效的:- - + + + 返回一个值,该值指示 对象是否与指定的已知安全标识符 (SID) 类型匹配。 + 如果 对象的 SID 类型,则为 true;否则为 false。 + 一个要与 对象进行比较的值。 + + + 返回安全标识符的二进制表示形式的最大大小(以字节为单位)。 + + + 返回安全标识符的二进制表示形式的最小大小(以字节为单位)。 + + + 比较两个 对象以确定它们是否相等。如果这两个对象具有与 属性返回的规范表示形式相同的规范表示形式,或是二者都为 null,则将它们视为相等。 + 如果 相等,则为 true;否则为 false。 + 用于相等比较的左操作数。此参数可以为 null。 + 用于相等比较的右操作数。此参数可以为 null。 + + + 比较两个 对象以确定它们是否不相等。如果二者的规范名称表示形式与 属性返回的表示形式不同,或其中一个对象为 null 而另一个对象不是,它们将被视为不相等。 + 如果 不相等,则为 true;否则为 false。 + 用于不相等比较的左操作数。此参数可以为 null。 + 用于不相等比较的右操作数。此参数可以为 null。 + + + 以安全说明符定义语言 (SDDL) 格式返回 对象表示的帐户的安全标识符 (SID)。S-1-5-9 就是一个 SDDL 格式。 + + 对象表示的帐户的 SID(SDDL 格式)。 + + + 对象表示的帐户名转换为另一 派生的类型。 + 转换后的标识。 + 进行的转换的目标类型。目标类型必须为由 方法视为有效的类型。 + + 为 null。 + + 不是 类型。 + 未能转换部分或所有标识引用。 + 返回了 Win32 错误。 + + + + + + 返回由此 对象表示的安全标识符 (SID) 的安全说明符定义语言 (SDDL) 字符串(全部大写)。 + 对象表示的 SID 的 SDDL 字符串(全部大写)。 + + + + + + 定义与访问令牌相关联的用户帐户的特权。 + + + 用户可以更改标记的默认所有者、主要组或自由访问控制列表 (DACL)。 + + + 用户可以更改标记中的组的特性。 + + + 用户可以启用或禁用标记中的特权。 + + + 用户可以调整标记的会话标识符。 + + + 用户具有对标记的所有可能的访问权限。 + + + 用户可以将主标记附加到进程上。 + + + 用户可以复制标记。 + + + 用户可以模拟客户端。 + + + 可以为 枚举指定的最大值。 + + + 用户可以查询标记。 + + + 用户可以查询标记的源。 + + + 用户对标记具有标准读权限和 特权。 + + + 用户对标记具有标准写权限以及 特权。 + + + 定义一组常用的安全标识符 (SID)。 + + + 指示一个与 Account Administrators 组匹配的 SID。 + + + 指示一个与 Certificate Administrators 组匹配的 SID。 + + + 指示一个与 Account Computer 组匹配的 SID。 + + + 指示一个与 Account Controller 组匹配的 SID。 + + + 指示一个与 Account Domain Administrator 组匹配的 SID。 + + + 指示一个与 Account Domain Guests 组匹配的 SID。 + + + 指示一个与 Account Domain Users 组匹配的 SID。 + + + 指示一个与 Enterprise Administrators 组匹配的 SID。 + + + 指示一个与 Account Guest 组匹配的 SID。 + + + 指示一个与 Account Kerberos Target 组匹配的 SID。 + + + 指示一个与 Policy Administrators 组匹配的 SID。 + + + 指示一个与 RAS and IAS Server 帐户匹配的 SID。 + + + 指示一个与 Schema Administrators 组匹配的 SID。 + + + 指示 Anonymous 帐户的 SID。 + + + 指示一个已验证身份的用户的 SID。 + + + 指示一个批处理进程的 SID。当标记的进程作为批处理作业登录时,此 SID 被添加到该进程中。 + + + 指示一个与 Account Operators 帐户匹配的 SID。 + + + 指示一个与 Administrator 帐户匹配的 SID。 + + + 指示一个与 Windows Authorization Access 组匹配的 SID。 + + + 指示一个与 Backup Operators 组匹配的 SID。 + + + 指示一个与 Domain 帐户匹配的 SID。 + + + 指示一个与 Guest 帐户匹配的 SID。 + + + 指示一个允许用户创建传入的目录林信任的 SID。此 SID 将被添加到属于目录林根域中的 Incoming Forest Trust Builders 内置组成员的用户的标记中。 + + + 指示一个与 Network Operators 组匹配的 SID。 + + + 指示一个与具有远程访问权限、能够监控计算机的用户组相匹配的 SID。 + + + 指示一个 SID,它与具有远程访问权限、能够安排此计算机上的性能计数器记录的用户组相匹配。 + + + 指示一个与 Power Users 组匹配的 SID。 + + + 指示一个与 Windows 2000 之前的兼容帐户匹配的 SID。 + + + 指示一个与 Print Operators 组匹配的 SID。 + + + 指示一个与 Remote Desktop Users 匹配的 SID。 + + + 指示一个与 Replicator 帐户匹配的 SID。 + + + 指示一个与 System Operators 组匹配的 SID。 + + + 指示一个与内置用户帐户匹配的 SID。 + + + 指示一个创建者组服务器 SID。 + + + 指示一个与某对象的创建者组匹配的 SID。 + + + 指示一个创建者所有者服务器 SID。 + + + 指示一个与某对象的所有者或创建者匹配的 SID。 + + + 指示一个拨号帐户的 SID。 + + + 指示一个在 Microsoft 摘要式身份验证包对客户端进行身份验证时存在的 SID。 + + + 指示一个企业控制器的 SID。 + + + 指示一个交互式帐户的 SID。当标记的进程以交互方式登录时,此 SID 被添加到该进程。 + + + 指示一个与本地服务匹配的 SID。 + + + 指示一个本地 SID。 + + + 指示一个与本地系统匹配的 SID。 + + + 指示一个与登录 ID 匹配的 SID。 + + + 指示 枚举中定义的最大 SID。 + + + 指示一个与网络服务匹配的 SID。 + + + 指示一个网络帐户的 SID。当标记的进程通过网络登录时,此 SID 被添加到该进程。 + + + 指示 Windows NT 颁发机构的 SID。 + + + 指示一个在 Microsoft NTLM 身份验证包对客户端进行身份验证时存在的 SID。 + + + 指示一个空 SID。 + + + 指示一个当用户在启用了选择性身份验证选项的情况下跨目录林进行身份验证时存在的 SID。如果此 SID 存在,则 不能存在。 + + + 指示一个代理 SID。 + + + 指示一个与远程登录匹配的 SID。 + + + 指示受限代码的 SID。 + + + 指示一个在安全通道 (SSL/TLS) 身份验证包对客户端进行身份验证时存在的 SID。 + + + 指示一个 SID 自身的 SID。 + + + 指示某服务的 SID。当标记的进程作为服务登录时,此 SID 被添加到该进程。 + + + 指示一个与终端服务器帐户匹配的 SID。 + + + 指示一个当用户在目录林内部或通过没有启用选择性身份验证选项的信任进行身份验证时存在的 SID。如果此 SID 存在,则 不能存在。 + + + 指示一个在可以发出终端服务器许可证的服务器上存在的 SID。 + + + 指示一个与任何人都匹配的 SID。 + + + 指定要与 一起使用的公共角色。 + + + 帐户操作员管理计算机或域中的用户帐户。 + + + 管理员具有对计算机或域的完全的无限制的访问权限。 + + + 备份操作员仅在出于备份或还原文件目的时才可以重写安全限制。 + + + 来宾受到比用户更多的限制。 + + + 超级用户具有大部分管理员权限(但也受到某些限制)。因此,高级用户除了可以运行已验证过的应用程序外,还可以运行旧式应用程序。 + + + 打印操作员可以获得打印机的控制权。 + + + 复制程序支持域中的文件复制。 + + + 系统操作员管理特定的计算机。 + + + 用户被阻止进行意外的或有意的系统级更改。因此,用户可以运行已验证过的应用程序,但不能运行大部分旧式应用程序。 + + + 表示 Windows 用户。 + + + 为指定的 Windows 帐户标记表示的用户初始化 类的新实例。 + 用户的帐户标记,代码当前即以该用户的名义运行。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + 为指定的 Windows 帐户标记和指定的身份验证类型表示的用户初始化 类的新实例。 + 用户的帐户标记,代码当前即以该用户的名义运行。 + (仅供参考之用。) 用于标识用户的身份验证的类型。有关更多信息,请参见“备注”。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [SECURITY CRITICAL] 获取此 实例的此 + 返回 + + + 释放由 使用的所有资源。 + + + 释放由 占用的非托管资源,还可以另外再释放托管资源。 + 若要释放托管资源和非托管资源,则为 true;若仅释放非托管资源,则为 false。 + + + 返回 对象,可在代码中将其用作 sentinel 值来表示匿名用户。属性值不表示 Windows 操作系统使用的内置匿名标识。 + 表示匿名用户的对象。 + + + 返回表示当前 Windows 用户的 对象。 + 表示当前用户的对象。 + The caller does not have the correct permissions. + + + + + + 返回一个 对象,该对象表示线程或进程(具体取决于 参数的值)的 Windows 标识。 + 表示 Windows 用户的对象。 + 如果为 true,则仅在线程当前正在模拟时才返回 ;如果为 false,则在线程正在模拟时返回线程的 ,在线程当前没有模拟时返回进程的 。 + + + + + + 返回一个 对象,该对象使用指定的所需标记访问级别来表示当前 Windows 用户。 + 表示当前用户的对象。 + 枚举值的按位组合。 + + + + + + 获取当前 Windows 用户所属的组。 + 一个对象,它表示当前 Windows 用户所属的组。 + + + 获取用户的模拟级别。 + 用于指定模拟级别的枚举值之一。 + + + 获取一个值,该值指示系统是否将用户帐户标识为匿名帐户。 + 如果用户帐户是匿名帐户,则为 true;否则为 false。 + + + 获取一个值,该值指示系统是否将用户帐户标识为 帐户。 + 如果用户帐户是 帐户,则为 true;否则为 false。 + + + 获取一个值,该值指示系统是否将用户帐户标识为 帐户。 + 如果用户帐户是 帐户,则为 true;否则为 false。 + + + 获取标记所有者的安全标识符 (SID)。 + 标记所有者的对象。 + + + 作为模拟 Windows 标识运行指定操作。可以使用 并直接作为参数提供函数,而不是使用模拟方法调用并在 中运行函数。 + 模拟 Windows 标识 SafeAccessTokenHandle。 + 要运行的 System.Action。 + + + 作为模拟 Windows 标识运行指定函数。可以使用 并直接作为参数提供函数,而不是使用模拟方法调用并在 中运行函数。 + 返回函数的结果。 + 模拟 Windows 标识 SafeAccessTokenHandle。 + 要运行的 System.Func。 + 函数使用并返回的对象的类型。 + + + 获取用户的安全标识符 (SID)。 + 用户对象。 + + + 允许代码检查 Windows 用户的 Windows 组成员身份。 + + + 使用指定的 对象初始化 类的新实例。 + 根据其构造 新实例的对象。 + + 为 null。 + + + 确定当前主体是否属于具有指定相对标识符 (RID) 的 Windows 用户组。 + 如果当前主体是指定的 Windows 用户组的成员(即在特定的角色中),则为 true;否则为 false。 + 在其中检查主体的成员资格状态的 Windows 用户组的 RID。 + + + + + + 确定当前主体是否属于具有指定的安全标识符 (SID) 的 Windows 用户组。 + 如果当前主体是指定的 Windows 用户组的成员,则为 true;否则为 false。 + 唯一标识 Windows 用户组的 。 + + 为 null。 + Windows 返回了 Win32 错误。 + + + + + + 确定当前主体是否属于具有指定 的 Windows 用户组。 + 如果当前主体是指定的 Windows 用户组的成员,则为 true;否则为 false。 + + 值之一。 + + 不是有效的 值。 + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hant/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hant/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..d76397a --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard1.3/zh-hant/System.Security.Principal.Windows.xml @@ -0,0 +1,744 @@ + + + + System.Security.Principal.Windows + + + + [安全性關鍵] 將安全控制代碼提供給 Windows 執行緒或處理序存取語彙基元。如需詳細資訊,請參閱存取語彙基元 + + + [安全性關鍵] 初始化 類別的新執行個體。 + + 物件,代表所要使用之已存在的控制代碼。使用 傳回無效的控制代碼。 + + + [安全性關鍵] 傳回由 物件和 具現化的無效控制代碼。 + 傳回 物件。 + + + [安全性關鍵] 取得值,表示控制代碼是否無效。 + 如果控制代碼無效,則為 true;否則為 false。 + + + 表示主體的例外狀況,該主體的識別 (Identity) 無法對應至已知的識別。 + + + 初始化 類別的新執行個體。 + + + 使用指定的錯誤訊息,初始化 類別的新執行個體。 + 解釋例外狀況原因的錯誤訊息。 + + + 使用指定的錯誤訊息和內部例外狀況,初始化 類別的新執行個體。 + 解釋例外狀況原因的錯誤訊息。 + 導致目前例外狀況的例外。如果 不是 null,則目前的例外狀況會在處理內部例外狀況的 catch 區塊中引發。 + + + 表示 例外狀況的未對應識別之集合。 + 未對應識別之集合。 + + + 表示識別 (Identity),且為 類別的基底類別。這個類別不提供公用建構函式 (Constructor),因此無法繼承。 + + + 傳回值,指出指定物件是否等於此 類別執行個體。 + 如果 是與這個 執行個體具有相同基礎型別和值的物件,則為 true,否則為 false。 + 要與這個 執行個體比較的物件,或 null 參考。 + + + 做為 的雜湊函式。 適用於雜湊演算法和雜湊資料表這類的資料結構。 + 這個 物件的雜湊程式碼。 + + + 傳回值,指出指定型別是否為 類別的有效轉譯型別。 + 如果 類別的有效轉譯型別,則為 true,否則為 false。 + 正在查詢是否可有效做為 的轉換目標之型別。下列是有效的目標型別: + + + 比較兩個 物件,判斷它們是否相等。如果它們的正式名稱表示與 屬性所傳回的相同,或兩者都是 null,則會將它們視為相等。 + 如果 相等,則為 true,否則為 false。 + 用於相等比較的左 運算元。這個參數可以是 null。 + 用於相等比較的右 運算元。這個參數可以是 null。 + + + 比較兩個 物件,判斷它們是否不相等。如果它們的正式名稱表示與 屬性所傳回的不同,或其中一個物件為 null 而另一個不是,則會將它們視為不相等。 + 如果 不相等,則為 true,否則為 false。 + 用於不相等比較的左 運算元。這個參數可以是 null。 + 用於不相等比較的右 運算元。這個參數可以是 null。 + + + 傳回由 物件表示的識別之字串表示。 + 字串格式的識別。 + + + 物件所表示的帳戶名稱轉譯為另一個 衍生型別。 + 轉換的識別。 + 轉換成的目標型別。 + + + 取得由 物件表示的識別之字串值。 + 物件表示的識別之字串值。 + + + 代表 物件的集合,並提供將多組 衍生物件轉換成 衍生型別的方法。 + + + 使用集合中的零個項目,初始化 類別的新執行個體。 + + + 使用指定的初始大小,初始化 類別的新執行個體。 + 集合中的初始項目數。 的值僅供提示之用,不一定是已建立項目的最大數目。 + + + 物件新增到 集合。 + 要新增到集合的 物件。 + + + 集合清除所有的 物件。 + + + 指出 集合是否含有指定的 物件。 + 如果集合包含指定的物件則為 true。 + 要檢查的 物件。 + + + 從指定的索引處開始,將 集合複製到 陣列。 + + 陣列物件, 集合將複製到該物件。 + + 中以零起始的索引, 集合將複製到該處。 + + + 取得 集合中的項目數目。 + + 集合中的 物件數目。 + + + 取得列舉值,可用來逐一查看 集合。 + + 集合的列舉。 + + + 取得或設定位在 集合中指定索引處的節點。 + 位在集合中指定索引處的 。如果 大於或等於集合中的節點數,則傳回值為 null。 + + 集合中以零起始的索引。 + + + 從集合中移除指定的 物件。 + 如果已從集合中移除指定的物件則為 true。 + 要移除的 物件。 + + + + 取得列舉值,可用來逐一查看 集合。 + + 集合的列舉。 + + + 將集合中的物件轉換成指定的型別。呼叫這個方法與呼叫第二個參數設定為 false 的 相同,這表示轉換失敗的項目將不會擲回例外狀況。 + + 集合,代表原始集合的轉換內容。 + 集合中的項目要轉換成的型別。 + + + + + + 將集合中的物件轉換成指定的型別,並使用指定的預設容錯來處理或忽略與沒有轉換對應的型別相關聯之錯誤。 + + 集合,代表原始集合的轉換內容。 + 集合中的項目要轉換成的型別。 + 布林值,可決定處理轉換錯誤的方式。如果 為 true,則由於找不到轉譯的對應而發生的轉換錯誤,會導致轉換失敗並擲回例外狀況。如果 為 false,則由於找不到轉譯的對應而無法轉換的型別,會在沒有轉換的情況下複製到要傳回的集合中。 + + + + + + 代表使用者或群組帳戶。 + + + 使用指定的名稱,初始化 類別的新執行個體。 + 用來建立 物件的名稱。這個參數不可以是 null 或空字串。 + + 為 null。 + + 為空字串。-或- 太長。 + + + 使用指定的網域名稱和帳戶名稱,初始化 類別的新執行個體。 + 網域名稱。這個參數可以是 null 或空字串。如果網域名稱為 null 值,則會將其視為空字串。 + 帳戶名稱。這個參數不可以是 null 或空字串。 + + 為 null。 + + 為空字串。-或- 太長。-或- 太長。 + + + 傳回值,指出這個 物件是否等於指定的物件。 + 如果 是與這個 物件具有相同基礎型別和值的物件則為 true,否則為 false。 + 與這個 物件相比較的物件,或 null。 + + + 做為目前 物件的雜湊函式。 方法適用於雜湊演算法和雜湊資料表這類的資料結構。 + 目前 物件的雜湊值 (Hash Value)。 + + + 傳回值,指出指定型別是否為 類別的有效轉譯型別。 + 如果 類別的有效轉譯型別則為 true,否則為 false。 + 正在查詢是否可有效做為 的轉換目標之型別。下列是有效的目標型別:- - + + + 比較兩個 物件,判斷它們是否相等。如果它們的正式名稱表示與 屬性所傳回的相同,或兩者都是 null,則會將它們視為相等。 + 如果 相等則為 true,否則為 false。 + 用於相等比較的左運算元。這個參數可以是 null。 + 用於相等比較的右運算元。這個參數可以是 null。 + + + 比較兩個 物件,判斷它們是否不相等。如果它們的正式名稱表示與 屬性所傳回的不同,或其中一個物件為 null 而另一個不是,則會將它們視為不相等。 + 如果 不相等則為 true,否則為 false。 + 用於不相等比較的左運算元。這個參數可以是 null。 + 用於不相等比較的右運算元。這個參數可以是 null。 + + + 傳回 物件所表示的帳戶之帳戶名稱,格式為 Domain\Account。 + 帳戶名稱,格式為 Domain\Account。 + + + 物件所表示的帳戶名稱轉譯為另一個 衍生型別。 + 轉換的識別。 + 轉換成的目標型別。目標型別必須是 方法視為有效的型別。 + + 為 null。 + + 不是 型別。 + 無法轉譯某些或所有識別參考。 + 來源帳戶名稱太長。-或-已傳回 Win32 錯誤碼。 + + + + + + 傳回這個 物件的大寫字串表示。 + 這個 物件的大寫字串表示。 + + + + + + 代表安全識別項 (SID),並為 SID 提供封送處理 (Marshaling) 和比較作業。 + + + 使用指定的安全識別項 (SID) 二進位表示,初始化 類別的新執行個體。 + 表示 SID 的位元組陣列。 + 用來做為 中的起始索引之位元組位移。 + + + 使用表示安全識別項 (SID) 之二進位格式的整數,初始化 類別的新執行個體。 + 整數,表示 SID 的二進位格式。 + + + 使用指定的已知安全識別項 (SID) 型別和網域 SID,初始化 類別的新執行個體。 + 其中一個列舉值。這個值不可以是 。 + 網域 SID。下列 值需要這個值。任何其他 值會忽略這個參數。- - - - - - - - - - - - - + + + 使用安全性描述元定義語言 (SDDL) 格式的指定安全識別項 (SID),初始化 類別的新執行個體。 + 用來建立 物件之 SID 的 SDDL 字串。 + + + 如果 SID 代表 Windows 帳戶 SID,則傳回 物件所表示的 SID 之帳戶網域安全識別項 (SID) 部分。如果 SID 不代表 Windows 帳戶 SID,則這個屬性會傳回 + 如果 SID 代表 Windows 帳戶 SID,則傳回 物件所表示的 SID 之帳戶網域 SID 部分,否則傳回 + + + 傳回 物件所表示的安全識別項 (SID) 之長度,以位元組為單位。 + 傳回 物件所表示的 SID 之長度,以位元組為單位。 + + + 將目前的 物件與指定的 物件相比較。 + 帶正負號的數字,指出這個執行個體與 的相對值。傳回值說明小於零這個執行個體小於 。Zero這個執行個體等於 。大於零這個執行個體大於 + 要與目前物件比較的物件。 + + + 傳回值,指出這個 物件是否等於指定的物件。 + 如果 是與這個 物件具有相同基礎型別和值的物件則為 true,否則為 false。 + 與這個 物件相比較的物件,或 null。 + + + 指出指定的 物件是否等於目前的 物件。 + 如果 的值和目前 物件的值相等則為 true。 + 要與目前物件比較的物件。 + + + 類別所表示的指定安全識別項 (SID) 之二進位表示,複製到位元組陣列。 + 接收複製的 SID 之位元組陣列。 + 用來做為 中的起始索引之位元組位移。 + + + 做為目前 物件的雜湊函式。 方法適用於雜湊演算法和雜湊資料表這類的資料結構。 + 目前 物件的雜湊值 (Hash Value)。 + + + 傳回值,指出這個 物件所表示的安全識別項 (SID) 是否為有效的 Windows 帳戶 SID。 + 如果這個 物件所表示的 SID 是有效的 Windows 帳戶 SID 則為 true,否則為 false。 + + + 傳回值,指出這個 物件所表示的安全識別項 (SID) 是否與指定的 SID 來自相同網域。 + 如果這個 物件所表示的 SID 與 SID 位在相同網域則為 true,否則為 false。 + 要與這個 物件比較的 SID。 + + + 傳回值,指出指定型別是否為 類別的有效轉譯型別。 + 如果 類別的有效轉譯型別則為 true,否則為 false。 + 正在查詢是否可有效做為 的轉換目標之型別。下列是有效的目標型別:- - + + + 傳回值,指出 物件是否符合指定的已知安全識別項 (SID) 型別。 + 如果 物件的 SID 型別則為 true,否則為 false。 + 要與 物件比較的值。 + + + 傳回安全識別項之二進位表示的最大值,以位元組為單位。 + + + 傳回安全識別項之二進位表示的最小值,以位元組為單位。 + + + 比較兩個 物件,判斷它們是否相等。如果它們的正式名稱表示與 屬性所傳回的相同,或兩者都是 null,則會將它們視為相等。 + 如果 相等,則為 true,否則為 false。 + 用於相等比較的左運算元。這個參數可以是 null。 + 用於相等比較的右運算元。這個參數可以是 null。 + + + 比較兩個 物件,判斷它們是否不相等。如果它們的正式名稱表示與 屬性所傳回的不同,或其中一個物件為 null 而另一個不是,則會將它們視為不相等。 + 如果 不相等,則為 true,否則為 false。 + 用於不相等比較的左運算元。這個參數可以是 null。 + 用於不相等比較的右運算元。這個參數可以是 null。 + + + 以安全性描述元定義語言 (SDDL) 格式,傳回 物件所表示的帳戶之安全識別項 (SID)。SDDL 格式範例為 S-1-5-9。 + + 物件所表示的帳戶之 SID,採用 SDDL 格式。 + + + 物件所表示的帳戶名稱轉譯為另一個 衍生型別 (Derived Type)。 + 轉換的識別。 + 轉換成的目標型別。目標型別必須是 方法視為有效的型別。 + + 為 null。 + + 不是 型別。 + 無法轉譯某些或所有識別參考。 + 已傳回 Win32 錯誤碼。 + + + + + + 傳回這個 物件所表示的安全識別項 (SID) 之大寫安全性描述元定義語言 (SDDL) 字串。 + 傳回 物件所表示的 SID 之大寫 SDDL 字串。 + + + + + + 定義與存取語彙基元 (Token) 關聯的使用者帳戶之權限。 + + + 使用者可以變更語彙基元的預設擁有人、主要群組或任意存取控制清單 (DACL)。 + + + 使用者可以變更語彙基元中群組的屬性 (Attribute)。 + + + 使用者可以啟用或停用語彙基元中的權限。 + + + 使用者可以調整語彙基元的工作階段識別項。 + + + 使用者擁有對語彙基元的所有可能存取。 + + + 使用者可以附加主要語彙基元至處理序。 + + + 使用者可以複製語彙基元。 + + + 使用者可以模擬用戶端。 + + + 可為 列舉型別 (Enumeration) 指派的最大值。 + + + 使用者可以查詢語彙基元。 + + + 使用者可以查詢語彙基元的來源。 + + + 使用者擁有標準讀取權,以及語彙基元的 權限。 + + + 使用者擁有標準寫入權,以及語彙基元的 權限。 + + + 定義常用的安全識別項 (SID) 集合。 + + + 指出符合帳戶系統管理員群組的 SID。 + + + 指出符合憑證系統管理員群組的 SID。 + + + 指出符合帳戶電腦群組的 SID。 + + + 指出符合帳戶控制站群組的 SID。 + + + 指出符合帳戶網域系統管理員群組的 SID。 + + + 指出符合帳戶網域來賓群組的 SID。 + + + 指出符合帳戶網域使用者群組的 SID。 + + + 指出符合企業系統管理員群組的 SID。 + + + 指出符合帳戶來賓群組的 SID。 + + + 指出符合帳戶 Kerberos 目標群組的 SID。 + + + 指出符合原則系統管理員群組的 SID。 + + + 指出符合 RAS 和 IAS 伺服器帳戶的 SID。 + + + 指出符合結構描述系統管理員群組的 SID。 + + + 指出匿名帳戶的 SID。 + + + 指出已驗證使用者的 SID。 + + + 指出批次處理的 SID。這個 SID 會在登入為批次工作時加入語彙基元 (Token) 的處理序。 + + + 指出符合帳戶操作員帳戶的 SID。 + + + 指出符合系統管理員帳戶的 SID。 + + + 指出符合 Windows 授權存取群組的 SID。 + + + 指出符合備份操作員群組的 SID。 + + + 指出符合網域帳戶的 SID。 + + + 指出符合來賓帳戶的 SID。 + + + 指出可讓使用者建立連入樹系信任的 SID。它會加入使用者的語彙基元中,該使用者為樹系根網域中 Incoming Forest Trust Builders 內建群組的成員。 + + + 指出符合網路操作員群組的 SID。 + + + 指出符合使用者群組的 SID,這些使用者可以從遠端存取來監視電腦。 + + + 指出符合使用者群組的 SID,這些使用者可以從遠端存取這部電腦的效能計數器排程記錄。 + + + 指出符合進階使用者 (Power User) 群組的 SID。 + + + 指出符合 pre-Windows 2000 相容帳戶的 SID。 + + + 指出符合列印操作員群組的 SID。 + + + 指出符合遠端桌面使用者的 SID。 + + + 指出符合複寫器帳戶的 SID。 + + + 指出符合系統操作員群組的 SID。 + + + 指出符合內建使用者帳戶的 SID。 + + + 指出建立者群組伺服器 SID。 + + + 指出符合物件的建立者群組之 SID。 + + + 指出建立者擁有者伺服器 SID。 + + + 指出符合物件的擁有者或建立者之 SID。 + + + 指出撥號帳戶的 SID。 + + + 指出當 Microsoft Digest 驗證封裝驗證用戶端時所存在的 SID。 + + + 指出企業控制站的 SID。 + + + 指出互動式帳戶的 SID。這個 SID 會在進行互動式登入時加入語彙基元的處理序。 + + + 指出符合本機服務的 SID。 + + + 指出本機 SID。 + + + 指出符合本機系統的 SID。 + + + 指出符合登入 ID 的 SID。 + + + 指出 列舉型別中所定義的最大 SID。 + + + 指出符合網路服務的 SID。 + + + 指出網路帳戶的 SID。這個 SID 會在透過網路登入時加入語彙基元的處理序。 + + + 指出符合 Windows NT Authority 的 SID。 + + + 指出當 Microsoft NTLM 驗證封裝驗證用戶端時所存在的 SID。 + + + 指出 null SID。 + + + 指出當使用者在啟用選擇性驗證選項的情況下透過樹系驗證時所存在的 SID。如果有這個 SID,則 不能存在。 + + + 指出 Proxy SID。 + + + 指出符合遠端登入的 SID。 + + + 指出設限代碼的 SID。 + + + 指出當安全通道 (SSL/TLS) 驗證封裝驗證用戶端時所存在的 SID。 + + + 指出自己的 SID。 + + + 指出服務的 SID。這個 SID 會在登入為服務時加入語彙基元的處理序。 + + + 指出符合終端伺服器帳戶的 SID。 + + + 指出當使用者從樹系內或透過沒有啟用選擇性驗證選項的信任來驗證時,所存在的 SID。如果有這個 SID,則 不能存在。 + + + 指出 SID 存在於可核發終端伺服器授權的伺服器中。 + + + 指出符合所有人的 SID。 + + + 指定與 搭配使用的通用角色。 + + + 帳戶操作員管理電腦或網域上的使用者帳戶。 + + + 管理員已完成並解除電腦或網域的存取限制。 + + + 備份操作員可以覆寫專供備份或還原檔案使用的安全性限制。 + + + Guest 的限制多於使用者。 + + + 進階使用者 (Power User) 除了部分限制外擁有大部分的管理使用權限。因此,除了已認證的應用程式之外,進階使用者也可以執行舊版的應用程式。 + + + 列印操作員可以取得印表機的控制。 + + + 複寫器支援網域中的檔案複寫。 + + + 系統操作員管理特定的電腦。 + + + 使用者無法執行無意或有意的系統級變更。因此,使用者可以執行已認證的應用程式,但無法執行大部分的舊版應用程式。 + + + 表示 Windows 使用者。 + + + 為指定 Windows 帳戶語彙基元所表示的使用者,初始化 類別的新執行個體。 + 使此程式碼為其執行之使用者的帳戶語彙基元。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + 為指定 Windows 帳戶語彙基元和指定驗證 (Authentication) 類型所表示的使用者,初始化 類別的新執行個體。 + 使此程式碼為其執行之使用者的帳戶語彙基元。 + (僅供內部使用。) 用來識別使用者的驗證類型。如需詳細資訊,請參閱<備註>。 + + is 0.-or- is duplicated and invalid for impersonation. + The caller does not have the correct permissions. -or-A Win32 error occurred. + + + [安全性關鍵] 取得這個 執行個體的這個 + 傳回 + + + 釋放 所使用的所有資源。 + + + 釋放 所使用的 Unmanaged 資源,並選擇性釋放 Managed 資源。 + true 表示釋放 Managed 和 Unmanaged 資源,false 則表示只釋放 Unmanaged 資源。 + + + 傳回可在程式碼中用來做為代表匿名使用者之 Sentinel 值的 物件。屬性值不代表 Windows 作業系統所使用的內建匿名識別。 + 物件,表示匿名使用者。 + + + 傳回表示目前 Windows 使用者的 物件。 + 物件,表示目前的使用者。 + The caller does not have the correct permissions. + + + + + + 傳回表示執行緒或處理程序之 Windows 識別的 物件,視 參數的值而定。 + 物件,表示 Windows 使用者。 + true 表示只有當執行緒目前正在模擬時才會傳回 ;false 則表示如果執行緒目前正在模擬時,會傳回執行緒的 ,或執行緒目前不是正在模擬時,則會傳回處理程序的 。 + + + + + + 使用指定所要的語彙基元存取層級,傳回代表目前 Windows 使用者的 物件。 + 物件,表示目前的使用者。 + 列舉值的位元組合。 + + + + + + 取得目前 Windows 使用者所屬的群組。 + 物件,表示目前 Windows 使用者所屬的群組。 + + + 設定使用者的模擬層級。 + 其中一個列舉值,這個值指定模擬層級。 + + + 取得值,指出使用者帳戶是否已經由系統識別為匿名帳戶。 + 如果使用者帳戶是匿名帳戶,則為 true;否則為 false。 + + + 取得值,指出使用者帳戶是否由系統識別為 帳戶。 + 如果使用者帳戶是 帳戶,則為 true;否則為 false。 + + + 取得值,指出使用者帳戶是否由系統識別為 帳戶。 + 如果使用者帳戶是 帳戶,則為 true;否則為 false。 + + + 取得語彙基元擁有人的安全識別項 (SID)。 + 語彙基元擁有人的物件。 + + + 以模擬的 Windows 身分識別執行指定的動作。您可以使用 並提供您的函式做為參數,而不需要使用個人化的方法呼叫並在 中執行您的函式。 + 模擬之 Windows 身分識別的 SafeAccessTokenHandle。 + 要執行的 System.Action。 + + + 以模擬的 Windows 身分識別執行指定的函式。您可以使用 並提供您的函式做為參數,而不需要使用個人化的方法呼叫並在 中執行您的函式。 + 傳回函式的結果。 + 模擬之 Windows 身分識別的 SafeAccessTokenHandle。 + 要執行的 System.Func。 + 函式使用的物件類型與傳回的物件類型。 + + + 取得使用者的安全識別項 (SID)。 + 使用者的物件。 + + + 可讓程式碼檢查 Windows 使用者的 Windows 群組成員資格。 + + + 使用指定的 物件,初始化 類別的新執行個體。 + 物件,做為建構 之新執行個體的來源。 + + 為 null。 + + + 判斷目前的主體是否屬於具有指定相關識別元 (RID) 的 Windows 使用者群組。 + 如果目前主體是指定之 Windows 使用者群組的成員 (也就是,有特定角色),則為 true,否則為 false。 + Windows 使用者群組的 RID 是用來檢查主體的成員狀態。 + + + + + + 判斷目前的主體是否屬於具有指定安全性識別碼 (SID) 的 Windows 使用者群組。 + 如果目前的主體是指定 Windows 使用者群組的成員,則為 true,否則為 false。 + + ,可唯一識別 Windows 使用者群組。 + + 為 null。 + Windows 會傳回 Win32 錯誤。 + + + + + + 判斷目前的主體是否屬於具有指定 的 Windows 使用者群組。 + 如果目前的主體是指定 Windows 使用者群組的成員,則為 true,否則為 false。 + 其中一個 值。 + + 不是有效的 值。 + + + + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..6da7080 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/ref/netstandard2.0/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/ref/uap10.0.16299/_._ b/packages/System.Security.Principal.Windows.4.7.0/ref/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..9cb578d Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.0/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..4b17e42 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/unix/lib/netcoreapp2.1/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net46/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net46/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..06601a1 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net46/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..2027a85 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/net461/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..1614f8f Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.0/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..d747ad8 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.xml b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.xml new file mode 100644 index 0000000..15ec771 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netcoreapp2.1/System.Security.Principal.Windows.xml @@ -0,0 +1,1029 @@ + + + + System.Security.Principal.Windows + + + + Provides a safe handle to a Windows thread or process access token. For more information, see Access Tokens. + + + Initializes a new instance of the class. + An object that represents the pre-existing handle to use. Using returns an invalid handle. + + + Returns an invalid handle by instantiating a object with . + Returns a object. + + + Gets a value that indicates whether the handle is invalid. + + if the handle is not valid; otherwise, . + + + Represents an exception for a principal whose identity could not be mapped to a known identity. + + + Initializes a new instance of the class. + + + Initializes a new instance of the class by using the specified error message. + The error message that explains the reason for the exception. + + + Initializes a new instance of the class by using the specified error message and inner exception. + The error message that explains the reason for the exception. + The exception that is the cause of the current exception. If is not null, the current exception is raised in a block that handles the inner exception. + + + Gets serialization information with the data needed to create an instance of this object. + The object that holds the serialized object data about the exception being thrown. + The object that contains contextual information about the source or destination. + + + Represents the collection of unmapped identities for an exception. + The collection of unmapped identities. + + + Represents an identity and is the base class for the and classes. This class does not provide a public constructor, and therefore cannot be inherited. + + + Returns a value that indicates whether the specified object equals this instance of the class. + An object to compare with this instance, or a null reference. + + if is an object with the same underlying type and value as this instance; otherwise, . + + + Serves as a hash function for . is suitable for use in hashing algorithms and data structures like a hash table. + The hash code for this object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: + + + if is a valid translation type for the class; otherwise, . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the string representation of the identity represented by the object. + The identity in string format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . + The converted identity. + + + Gets the string value of the identity represented by the object. + The string value of the identity represented by the object. + + + Represents a collection of objects and provides a means of converting sets of -derived objects to -derived types. + + + Initializes a new instance of the class with zero items in the collection. + + + Initializes a new instance of the class by using the specified initial size. + The initial number of items in the collection. The value of is a hint only; it is not necessarily the maximum number of items created. + + + Adds an object to the collection. + The object to add to the collection. + + is . + + + Clears all objects from the collection. + + + Indicates whether the collection contains the specified object. + The object to check for. + + if the collection contains the specified object. + + is . + + + Copies the collection to an array, starting at the specified index. + An array object to which the collection is to be copied. + The zero-based index in where the collection is to be copied. + + + Gets the number of items in the collection. + The number of objects in the collection. + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Sets or gets the node at the specified index of the collection. + The zero-based index in the collection. + The at the specified index in the collection. If is greater than or equal to the number of nodes in the collection, the return value is . + + + Removes the specified object from the collection. + The object to remove. + + if the specified object was removed from the collection. + + is . + + + + Gets an enumerator that can be used to iterate through the collection. + An enumerator for the collection. + + + Converts the objects in the collection to the specified type. Calling this method is the same as calling with the second parameter set to , which means that exceptions will not be thrown for items that fail conversion. + The type to which items in the collection are being converted. + A collection that represents the converted contents of the original collection. + + + Converts the objects in the collection to the specified type and uses the specified fault tolerance to handle or ignore errors associated with a type not having a conversion mapping. + The type to which items in the collection are being converted. + A Boolean value that determines how conversion errors are handled. +If is , conversion errors due to a mapping not being found for the translation result in a failed conversion and exceptions being thrown. +If is , types that failed to convert due to a mapping not being found for the translation are copied without being converted into the collection being returned. + A collection that represents the converted contents of the original collection. + + + Represents a user or group account. + + + Initializes a new instance of the class by using the specified name. + The name used to create the object. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. + + + Initializes a new instance of the class by using the specified domain name and account name. + The name of the domain. This parameter can be or an empty string. Domain names that are null values are treated like an empty string. + The name of the account. This parameter cannot be or an empty string. + + is . + + is an empty string. +-or- + is too long. +-or- + is too long. + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise . + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical name representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise . + + + Returns the account name, in Domain \ Account format, for the account represented by the object. + The account name, in Domain \ Account format. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + The source account name is too long. +-or- +A Win32 error code was returned. + + + Returns a string representation of this object. + The string representation of this object. + + + Represents a security identifier (SID) and provides marshaling and comparison operations for SIDs. + + + Initializes a new instance of the class by using a specified binary representation of a security identifier (SID). + The byte array that represents the SID. + The byte offset to use as the starting index in . + + + Initializes a new instance of the class by using an integer that represents the binary form of a security identifier (SID). + An integer that represents the binary form of a SID. + + + Initializes a new instance of the class by using the specified well known security identifier (SID) type and domain SID. + One of the enumeration values. This value must not be . + The domain SID. This value is required for the following values. This parameter is ignored for any other values. +- +- +- +- +- +- +- +- +- +- +- +- +- + + + Initializes a new instance of the class by using the specified security identifier (SID) in Security Descriptor Definition Language (SDDL) format. + SDDL string for the SID used to create the object. + + + Returns the account domain security identifier (SID) portion from the SID represented by the object if the SID represents a Windows account SID. If the SID does not represent a Windows account SID, this property returns . + The account domain SID portion from the SID represented by the object if the SID represents a Windows account SID; otherwise, it returns . + + + Returns the length, in bytes, of the security identifier (SID) represented by the object. + The length, in bytes, of the SID represented by the object. + + + Compares the current object with the specified object. + The object to compare with the current object. + A signed number indicating the relative values of this instance and . + Return Value + + Description + + Less than zero + + This instance is less than . + + Zero + + This instance is equal to . + + Greater than zero + + This instance is greater than . + + + Returns a value that indicates whether this object is equal to a specified object. + An object to compare with this object, or . + + if is an object with the same underlying type and value as this object; otherwise, . + + + Indicates whether the specified object is equal to the current object. + The object to compare with the current object. + + if the value of is equal to the value of the current object. + + + Copies the binary representation of the specified security identifier (SID) represented by the class to a byte array. + The byte array to receive the copied SID. + The byte offset to use as the starting index in . + + + Serves as a hash function for the current object. The method is suitable for hashing algorithms and data structures like a hash table. + A hash value for the current object. + + + Returns a value that indicates whether the security identifier (SID) represented by this object is a valid Windows account SID. + + if the SID represented by this object is a valid Windows account SID; otherwise, . + + + Returns a value that indicates whether the security identifier (SID) represented by this object is from the same domain as the specified SID. + The SID to compare with this object. + + if the SID represented by this object is in the same domain as the SID; otherwise, . + + + Returns a value that indicates whether the specified type is a valid translation type for the class. + The type being queried for validity to serve as a conversion from . The following target types are valid: +- +- + + if is a valid translation type for the class; otherwise, . + + + Returns a value that indicates whether the object matches the specified well known security identifier (SID) type. + A value to compare with the object. + + if is the SID type for the object; otherwise, . + + + Returns the maximum size, in bytes, of the binary representation of the security identifier. + + + Returns the minimum size, in bytes, of the binary representation of the security identifier. + + + Compares two objects to determine whether they are equal. They are considered equal if they have the same canonical representation as the one returned by the property or if they are both . + The left operand to use for the equality comparison. This parameter can be . + The right operand to use for the equality comparison. This parameter can be . + + if and are equal; otherwise, . + + + Compares two objects to determine whether they are not equal. They are considered not equal if they have different canonical name representations than the one returned by the property or if one of the objects is and the other is not. + The left operand to use for the inequality comparison. This parameter can be . + The right operand to use for the inequality comparison. This parameter can be . + + if and are not equal; otherwise, . + + + Returns the security identifier (SID), in Security Descriptor Definition Language (SDDL) format, for the account represented by the object. An example of the SDDL format is S-1-5-9. + The SID, in SDDL format, for the account represented by the object. + + + Translates the account name represented by the object into another -derived type. + The target type for the conversion from . The target type must be a type that is considered valid by the method. + The converted identity. + + is . + + is not an type. + Some or all identity references could not be translated. + A Win32 error code was returned. + + + Returns an uppercase Security Descriptor Definition Language (SDDL) string for the security identifier (SID) represented by this object. + An uppercase SDDL string for the SID represented by the object. + + + Defines the privileges of the user account associated with the access token. + + + The user can change the default owner, primary group, or discretionary access control list (DACL) of the token. + + + The user can change the attributes of the groups in the token. + + + The user can enable or disable privileges in the token. + + + The user can adjust the session identifier of the token. + + + The user has all possible access to the token. + + + The user can attach a primary token to a process. + + + The user can duplicate the token. + + + The user can impersonate a client. + + + The maximum value that can be assigned for the enumeration. + + + The user can query the token. + + + The user can query the source of the token. + + + The user has standard read rights and the privilege for the token. + + + The user has standard write rights and the , and privileges for the token. + + + Defines a set of commonly used security identifiers (SIDs). + + + Indicates a SID that matches the account administrators group. + + + Indicates a SID that matches the certificate administrators group. + + + Indicates a SID that matches the account computer group. + + + Indicates a SID that matches the account controller group. + + + Indicates a SID that matches the account domain administrator group. + + + Indicates a SID that matches the account domain guests group. + + + Indicates a SID that matches the account domain users group. + + + Indicates a SID that matches the enterprise administrators group. + + + Indicates a SID that matches the account guest group. + + + Indicates a SID that matches the account Kerberos target group. + + + Indicates a SID that matches the policy administrators group. + + + Indicates a SID that matches the RAS and IAS server account. + + + Indicates a SID that matches the schema administrators group. + + + Indicates a SID for the anonymous account. + + + Indicates a SID for an authenticated user. + + + Indicates a SID for a batch process. This SID is added to the process of a token when it logs on as a batch job. + + + Indicates a SID that matches the account operators account. + + + Indicates a SID that matches the administrator account. + + + Indicates a SID that matches the Windows Authorization Access group. + + + Indicates a SID that matches the backup operators group. + + + Indicates a SID that matches the domain account. + + + Indicates a SID that matches the guest account. + + + Indicates a SID that allows a user to create incoming forest trusts. It is added to the token of users who are a member of the Incoming Forest Trust Builders built-in group in the root domain of the forest. + + + Indicates a SID that matches the network operators group. + + + Indicates a SID that matches the group of users that have remote access to monitor the computer. + + + Indicates a SID that matches the group of users that have remote access to schedule logging of performance counters on this computer. + + + Indicates a SID that matches the power users group. + + + Indicates a SID that matches pre-Windows 2000 compatible accounts. + + + Indicates a SID that matches the print operators group. + + + Indicates a SID that matches remote desktop users. + + + Indicates a SID that matches the replicator account. + + + Indicates a SID that matches the system operators group. + + + Indicates a SID that matches built-in user accounts. + + + Indicates a creator group server SID. + + + Indicates a SID that matches the creator group of an object. + + + Indicates a creator owner server SID. + + + Indicates a SID that matches the owner or creator of an object. + + + Indicates a SID for a dial-up account. + + + Indicates a SID present when the Microsoft Digest authentication package authenticated the client. + + + Indicates a SID for an enterprise controller. + + + Indicates a SID for an interactive account. This SID is added to the process of a token when it logs on interactively. + + + Indicates a SID that matches a local service. + + + Indicates a local SID. + + + Indicates a SID that matches the local system. + + + Indicates a SID that matches logon IDs. + + + Indicates the maximum defined SID in the enumeration. + + + Indicates a SID that matches a network service. + + + Indicates a SID for a network account. This SID is added to the process of a token when it logs on across a network. + + + Indicates a SID for the Windows NT authority. + + + Indicates a SID present when the Microsoft NTLM authentication package authenticated the client. + + + Indicates a null SID. + + + Indicates a SID present when the user authenticated across a forest with the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a proxy SID. + + + Indicates a SID that matches remote logons. + + + Indicates a SID for restricted code. + + + Indicates a SID present when the Secure Channel (SSL/TLS) authentication package authenticated the client. + + + Indicates a SID for self. + + + Indicates a SID for a service. This SID is added to the process of a token when it logs on as a service. + + + Indicates a SID that matches a terminal server account. + + + Indicates a SID present when the user authenticated from within the forest or across a trust that does not have the selective authentication option enabled. If this SID is present, then cannot be present. + + + Indicates a SID that matches an account read-only controllers group. + + + Indicates a SID that matches the application package authority. + + + Indicates a SID that applies to all app containers. + + + Indicates a SID that matches the built-in DCOM certification services access group. + + + Indicates a SID that allows a user to use cryptographic operations. It is added to the token of users who are a member of the CryptoOperators built-in group. + + + Indicates a SID that matches the distributed COM user group. + + + Indicates a SID that matches an event log readers group. + + + Indicates a SID that matches the Internet built-in user group. + + + Indicates a SID is present in a server that can issue Terminal Server licenses. + + + Indicates a SID that matches a cacheable principals group. + + + Indicates a SID for documents library capability for app containers. + + + Indicates a SID for Windows credentials capability for app containers. + + + Indicates a SID of Internet client and server capability for app containers. + + + Indicates a SID of Internet client capability for app containers. + + + Indicates a SID for music library capability for app containers. + + + Indicates a SID for pictures library capability for app containers. + + + Indicates a SID of private network client and server capability for app containers. + + + Indicates a SID for removable storage capability for app containers. + + + Indicates a SID for shared user certificates capability for app containers. + + + Indicates a SID for videos library capability for app containers. + + + Indicates a SID that matches a console logon group. + + + Indicates a SID that matches a creator and owner rights group. + + + Indicates a SID that matches an enterprise wide read-only controllers group. + + + Indicates a SID that matches a high level of trust label. + + + Indicates a SID that matches the Internet user group. + + + Indicates a SID that matches a local logon group. + + + Indicates a SID that matches an low level of trust label. + + + Indicates a SID that matches an medium level of trust label. + + + Indicates a SID that matches the medium plus integrity label. + + + Indicates a SID that matches a read-only enterprise domain controller. + + + Indicates a SID that matches a non-cacheable principals group. + + + Indicates a SID that matches a system label. + + + Indicates a SID that matches a certificate for the given organization. + + + Indicates a SID that matches an untrusted label. + + + Indicates a SID that matches a write restricted code group. + + + Indicates a SID that matches everyone. + + + Specifies the type of Windows account used. + + + An anonymous account. + + + A Windows guest account. + + + A standard user account. + + + A Windows system account. + + + Specifies common roles to be used with . + + + Account operators manage the user accounts on a computer or domain. + + + Administrators have complete and unrestricted access to the computer or domain. + + + Backup operators can override security restrictions for the sole purpose of backing up or restoring files. + + + Guests are more restricted than users. + + + Power users possess most administrative permissions with some restrictions. Thus, power users can run legacy applications, in addition to certified applications. + + + Print operators can take control of a printer. + + + Replicators support file replication in a domain. + + + System operators manage a particular computer. + + + Users are prevented from making accidental or intentional system-wide changes. Thus, users can run certified applications, but not most legacy applications. + + + Represents a Windows user. + + + Initializes a new instance of the class for the user represented by the specified Windows account token. + The account token for the user on whose behalf the code is running. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token and the specified authentication type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, and the specified Windows account type. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by the specified Windows account token, the specified authentication type, the specified Windows account type, and the specified authentication status. + The account token for the user on whose behalf the code is running. + (Informational use only.) The type of authentication used to identify the user. + One of the enumeration values. + + to indicate that the user is authenticated; otherwise, . + + is 0. +-or- + is duplicated and invalid for impersonation. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class for the user represented by information in a stream. + The object containing the account information for the user. + An object that indicates the stream characteristics. + A cannot be serialized across processes. + The caller does not have the correct permissions. +-or- +A Win32 error occurred. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + + Initializes a new instance of the class for the user represented by the specified User Principal Name (UPN). + The UPN for the user on whose behalf the code is running. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets this for this instance. + Returns a . + + + Gets the type of authentication used to identify the user. + The type of authentication used to identify the user. + Windows returned the Windows NT status code STATUS_ACCESS_DENIED. + There is insufficient memory available. + The caller does not have the correct permissions. +-or- +The computer is not attached to a Windows 2003 or later domain. +-or- +The computer is not running Windows 2003 or later. +-or- +The user is not a member of the domain the computer is attached to. + + + Gets all claims for the user represented by this Windows identity. + A collection of claims for this object. + + + Creates a new object that is a copy of the current instance. + A copy of the current instance. + + + Identifies the name of the default issuer. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Releases all resources used by the . + + + Releases the unmanaged resources used by the and optionally releases the managed resources. + + to release both managed and unmanaged resources; to release only unmanaged resources. + + + Returns a object that you can use as a sentinel value in your code to represent an anonymous user. The property value does not represent the built-in anonymous identity used by the Windows operating system. + An object that represents an anonymous user. + + + Returns a object that represents the current Windows user. + An object that represents the current user. + The caller does not have the correct permissions. + + + Returns a object that represents the Windows identity for either the thread or the process, depending on the value of the parameter. + + to return the only if the thread is currently impersonating; to return the of the thread if it is impersonating or the of the process if the thread is not currently impersonating. + An object that represents a Windows user. + + + Returns a object that represents the current Windows user, using the specified desired token access level. + A bitwise combination of the enumeration values. + An object that represents the current user. + + + Gets the groups the current Windows user belongs to. + An object representing the groups the current Windows user belongs to. + + + Gets the impersonation level for the user. + One of the enumeration values that specifies the impersonation level. + + + Gets a value that indicates whether the user account is identified as an anonymous account by the system. + + if the user account is an anonymous account; otherwise, . + + + Gets a value indicating whether the user has been authenticated by Windows. + + if the user was authenticated; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets a value indicating whether the user account is identified as a account by the system. + + if the user account is a account; otherwise, . + + + Gets the user's Windows logon name. + The Windows logon name of the user on whose behalf the code is being run. + + + Gets the security identifier (SID) for the token owner. + An object for the token owner. + + + Runs the specified action as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Action to run. + + + Runs the specified function as the impersonated Windows identity. Instead of using an impersonated method call and running your function in , you can use and provide your function directly as a parameter. + The SafeAccessTokenHandle of the impersonated Windows identity. + The System.Func to run. + The type of object used by and returned by the function. + The result of the function. + + + Implements the interface and is called back by the deserialization event when deserialization is complete. + The source of the deserialization event. + + + Sets the object with the logical context information needed to recreate an instance of this execution context. + An object containing the information required to serialize the . + An object containing the source and destination of the serialized stream associated with the . + + + Gets the Windows account token for the user. + The handle of the access token associated with the current execution thread. + + + Gets the security identifier (SID) for the user. + An object for the user. + + + Gets claims that have the property key. + A collection of claims that have the property key. + + + Enables code to check the Windows group membership of a Windows user. + + + Initializes a new instance of the class by using the specified object. + The object from which to construct the new instance of . + + is . + + + Gets all Windows device claims from this principal. + A collection of all Windows device claims from this principal. + + + Gets the identity of the current principal. + The object of the current principal. + + + Determines whether the current principal belongs to the Windows user group with the specified relative identifier (RID). + The RID of the Windows user group in which to check for the principal's membership status. + + if the current principal is a member of the specified Windows user group, that is, in a particular role; otherwise, . + + + Determines whether the current principal belongs to the Windows user group with the specified security identifier (SID). + A that uniquely identifies a Windows user group. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is . + Windows returned a Win32 error. + + + Determines whether the current principal belongs to the Windows user group with the specified . + One of the values. + + if the current principal is a member of the specified Windows user group; otherwise, . + + is not a valid value. + + + Determines whether the current principal belongs to the Windows user group with the specified name. + The name of the Windows user group for which to check membership. + + if the current principal is a member of the specified Windows user group; otherwise, . + + + Gets all Windows user claims from this principal. + A collection of all Windows user claims from this principal. + + + \ No newline at end of file diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.Principal.Windows.dll b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.Principal.Windows.dll new file mode 100644 index 0000000..cc57329 Binary files /dev/null and b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/netstandard1.3/System.Security.Principal.Windows.dll differ diff --git a/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/uap10.0.16299/_._ b/packages/System.Security.Principal.Windows.4.7.0/runtimes/win/lib/uap10.0.16299/_._ new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Principal.Windows.4.7.0/useSharedDesignerContext.txt b/packages/System.Security.Principal.Windows.4.7.0/useSharedDesignerContext.txt new file mode 100644 index 0000000..e69de29 diff --git a/packages/System.Security.Principal.Windows.4.7.0/version.txt b/packages/System.Security.Principal.Windows.4.7.0/version.txt new file mode 100644 index 0000000..f5d54e7 --- /dev/null +++ b/packages/System.Security.Principal.Windows.4.7.0/version.txt @@ -0,0 +1 @@ +0f7f38c4fd323b26da10cce95f857f77f0f09b48 diff --git a/vwd.webinfo b/vwd.webinfo new file mode 100644 index 0000000..e69de29 diff --git a/web.config b/web.config index d503aeb..351f481 100644 --- a/web.config +++ b/web.config @@ -6,16 +6,16 @@ --> -
+
- + - + @@ -56,32 +56,40 @@ 5. Database: Stored in the database. Will always work, but slower. See online help for more information. --> - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - + - + - - - + + + + + + + + + + - - + + - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + - + - - + + - + - + - + - + - + - + - + - + - + - - + +