From cc5980f423cf58445f3ad8ff53c98c6ec7b369f7 Mon Sep 17 00:00:00 2001 From: "Xamarin Public Jenkins (auto-signing)" Date: Wed, 8 Jan 2020 08:36:52 +0000 Subject: [PATCH] Imported Upstream version 6.8.0.91 Former-commit-id: 4863c948385110554fe3b36b8716d23d16bc28b8 --- configure.REMOVED.git-id | 2 +- configure.ac.REMOVED.git-id | 2 +- .../System.Security.Cryptography.Pkcs.cs | 21 +++ .../profiles/monodroid/System.Security.cs | 171 ++++++++++++++++++ .../System.Security.Cryptography.Pkcs.cs | 21 +++ .../profiles/monotouch/System.Security.cs | 171 ++++++++++++++++++ .../profiles/net_4_x/System.Security.cs | 171 ++++++++++++++++++ mcs/build/common/Consts.cs | 2 +- .../TypeForwarders.cs | 23 ++- .../Pkcs12Builder.NotSupported.cs | 115 ++++++++++++ .../Pkcs12CertBag.NotSupported.cs | 50 +++++ .../Pkcs12ConfidentialityMode.NotSupported.cs | 13 ++ .../Pkcs12Info.NotSupported.cs | 59 ++++++ .../Pkcs12IntegrityMode.NotSupported.cs | 13 ++ .../Pkcs12KeyBag.NotSupported.cs | 25 +++ .../Pkcs12SafeBag.NotSupported.cs | 57 ++++++ .../Pkcs12SafeContents.NotSupported.cs | 171 ++++++++++++++++++ .../Pkcs12SafeContentsBag.NotSupported.cs | 20 ++ .../Pkcs12SecretBag.NotSupported.cs | 27 +++ .../Pkcs12ShroudedKeyBag.NotSupported.cs | 25 +++ .../Pkcs8PrivateKeyInfo.NotSupported.cs | 149 +++++++++++++++ .../Pkcs9LocalKeyId.NotSupported.cs | 32 ++++ .../Rfc3161TimestampRequest.NotSupported.cs | 120 ++++++++++++ .../Rfc3161TimestampToken.NotSupported.cs | 61 +++++++ .../Rfc3161TimestampTokenInfo.NotSupported.cs | 101 +++++++++++ .../common_System.Security.dll.sources | 20 ++ .../Mono.Security.dll.REMOVED.git-id | 2 +- .../System.Configuration.dll.REMOVED.git-id | 2 +- .../System.Core.dll.REMOVED.git-id | 2 +- .../System.IO.Compression.dll.REMOVED.git-id | 2 +- .../System.Numerics.dll.REMOVED.git-id | 2 +- .../System.Security.dll.REMOVED.git-id | 2 +- .../System.Xml.dll.REMOVED.git-id | 2 +- .../mcs.exe.REMOVED.git-id | 2 +- .../mscorlib.dll.REMOVED.git-id | 2 +- .../Mono.Security.dll.REMOVED.git-id | 2 +- .../System.Configuration.dll.REMOVED.git-id | 2 +- .../System.Core.dll.REMOVED.git-id | 2 +- .../System.IO.Compression.dll.REMOVED.git-id | 2 +- .../System.Numerics.dll.REMOVED.git-id | 2 +- .../System.Security.dll.REMOVED.git-id | 2 +- .../System.Xml.dll.REMOVED.git-id | 2 +- .../mcs.exe.REMOVED.git-id | 2 +- .../mscorlib.dll.REMOVED.git-id | 2 +- .../Mono.Security.dll.REMOVED.git-id | 2 +- .../System.Configuration.dll.REMOVED.git-id | 2 +- .../System.Core.dll.REMOVED.git-id | 2 +- .../System.IO.Compression.dll.REMOVED.git-id | 2 +- .../System.Numerics.dll.REMOVED.git-id | 2 +- .../System.Security.dll.REMOVED.git-id | 2 +- .../System.Xml.dll.REMOVED.git-id | 2 +- .../mcs.exe.REMOVED.git-id | 2 +- .../mscorlib.dll.REMOVED.git-id | 2 +- .../Mono.Security.dll.REMOVED.git-id | 2 +- .../System.Configuration.dll.REMOVED.git-id | 2 +- .../System.Core.dll.REMOVED.git-id | 2 +- .../System.IO.Compression.dll.REMOVED.git-id | 2 +- .../System.Numerics.dll.REMOVED.git-id | 2 +- .../System.Security.dll.REMOVED.git-id | 2 +- .../System.Xml.dll.REMOVED.git-id | 2 +- .../mcs.exe.REMOVED.git-id | 2 +- .../mscorlib.dll.REMOVED.git-id | 2 +- mono/mini/Makefile.am | 2 +- mono/mini/Makefile.am.in | 2 +- mono/mini/Makefile.in.REMOVED.git-id | 2 +- mono/mini/gshared.cs | 31 ++++ mono/mini/method-to-ir.c.REMOVED.git-id | 2 +- mono/mini/mini-llvm.c.REMOVED.git-id | 2 +- mono/mini/version.h | 2 +- mono/unit-tests/Makefile.in | 4 +- msvc/Makefile.in | 2 +- po/mcs/de.gmo | Bin 5406 -> 5406 bytes po/mcs/de.po.REMOVED.git-id | 2 +- po/mcs/es.gmo | Bin 16329 -> 16329 bytes po/mcs/es.po.REMOVED.git-id | 2 +- po/mcs/ja.gmo | Bin 20863 -> 20863 bytes po/mcs/ja.po.REMOVED.git-id | 2 +- po/mcs/mcs.pot | 4 +- po/mcs/pt_BR.gmo | Bin 72806 -> 72806 bytes po/mcs/pt_BR.po.REMOVED.git-id | 2 +- 80 files changed, 1719 insertions(+), 56 deletions(-) create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Builder.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12CertBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ConfidentialityMode.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Info.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12IntegrityMode.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12KeyBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContents.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContentsBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SecretBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ShroudedKeyBag.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs8PrivateKeyInfo.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs9LocalKeyId.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampRequest.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampToken.NotSupported.cs create mode 100644 mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampTokenInfo.NotSupported.cs diff --git a/configure.REMOVED.git-id b/configure.REMOVED.git-id index b8818105d8..0675de4876 100644 --- a/configure.REMOVED.git-id +++ b/configure.REMOVED.git-id @@ -1 +1 @@ -049b897e1931b418af32b321b8bec26b0c4f1210 \ No newline at end of file +2ae91bb0c89c4f0998ae02dab64020503cbb6770 \ No newline at end of file diff --git a/configure.ac.REMOVED.git-id b/configure.ac.REMOVED.git-id index 522630f003..fb5d46f796 100644 --- a/configure.ac.REMOVED.git-id +++ b/configure.ac.REMOVED.git-id @@ -1 +1 @@ -2460f68689d061e282b97ea542dea9e46ce5f0b5 \ No newline at end of file +25aab3b1ee524e128f9be3a269a94d1d17447248 \ No newline at end of file diff --git a/external/api-snapshot/profiles/monodroid/Facades/System.Security.Cryptography.Pkcs.cs b/external/api-snapshot/profiles/monodroid/Facades/System.Security.Cryptography.Pkcs.cs index a89a42aa95..b1c3768d96 100644 --- a/external/api-snapshot/profiles/monodroid/Facades/System.Security.Cryptography.Pkcs.cs +++ b/external/api-snapshot/profiles/monodroid/Facades/System.Security.Cryptography.Pkcs.cs @@ -21,14 +21,28 @@ [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipient))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientCollection))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientEnumerator))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsSigner))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.ContentInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.EnvelopedCms))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyAgreeRecipientInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyTransRecipientInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Builder))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12CertBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Info))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12KeyBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContents))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SecretBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9AttributeObject))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9ContentType))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentDescription))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentName))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9LocalKeyId))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9MessageDigest))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9SigningTime))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.PublicKeyInfo))] @@ -36,6 +50,13 @@ [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoCollection))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoEnumerator))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoType))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampToken))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignedCms))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoCollection))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoEnumerator))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifier))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKey))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKeyType))] diff --git a/external/api-snapshot/profiles/monodroid/System.Security.cs b/external/api-snapshot/profiles/monodroid/System.Security.cs index 1411008d2f..6e4d5675a4 100644 --- a/external/api-snapshot/profiles/monodroid/System.Security.cs +++ b/external/api-snapshot/profiles/monodroid/System.Security.cs @@ -173,6 +173,120 @@ namespace System.Security.Cryptography.Pkcs public override System.Security.Cryptography.Pkcs.SubjectIdentifier RecipientIdentifier { get { throw null; } } public override int Version { get { throw null; } } } + public sealed partial class Pkcs12Builder + { + public Pkcs12Builder() { } + public bool IsSealed { get { throw null; } } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, string password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsUnencrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { } + public byte[] Encode() { throw null; } + public void SealWithMac(System.ReadOnlySpan password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithMac(string password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithoutIntegrity() { } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12CertBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12CertBag(System.Security.Cryptography.Oid certificateType, System.ReadOnlyMemory encodedCertificate) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncodedCertificate { get { throw null; } } + public bool IsX509Certificate { get { throw null; } } + public System.Security.Cryptography.X509Certificates.X509Certificate2 GetCertificate() { throw null; } + public System.Security.Cryptography.Oid GetCertificateType() { throw null; } + } + public enum Pkcs12ConfidentialityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12Info + { + internal Pkcs12Info() { } + public System.Collections.ObjectModel.ReadOnlyCollection AuthenticatedSafe { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode IntegrityMode { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs12Info Decode(System.ReadOnlyMemory encodedBytes, out int bytesConsumed, bool skipCopy = false) { throw null; } + public bool VerifyMac(System.ReadOnlySpan password) { throw null; } + public bool VerifyMac(string password) { throw null; } + } + public enum Pkcs12IntegrityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12KeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12KeyBag(System.ReadOnlyMemory pkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory Pkcs8PrivateKey { get { throw null; } } + } + public abstract partial class Pkcs12SafeBag + { + protected Pkcs12SafeBag(string bagIdValue, System.ReadOnlyMemory encodedBagValue, bool skipCopy = false) { } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory EncodedBagValue { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.Oid GetBagId() { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12SafeContents + { + public Pkcs12SafeContents() { } + public System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode ConfidentialityMode { get { throw null; } } + public bool IsReadOnly { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12CertBag AddCertificate(System.Security.Cryptography.X509Certificates.X509Certificate2 certificate) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12KeyBag AddKeyUnencrypted(System.Security.Cryptography.AsymmetricAlgorithm key) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag AddNestedContents(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { throw null; } + public void AddSafeBag(System.Security.Cryptography.Pkcs.Pkcs12SafeBag safeBag) { } + public System.Security.Cryptography.Pkcs.Pkcs12SecretBag AddSecret(System.Security.Cryptography.Oid secretType, System.ReadOnlyMemory secretValue) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, string password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public void Decrypt(byte[] passwordBytes) { } + public void Decrypt(System.ReadOnlySpan passwordBytes) { } + public void Decrypt(System.ReadOnlySpan password) { } + public void Decrypt(string password) { } + public System.Collections.Generic.IEnumerable GetBags() { throw null; } + } + public sealed partial class Pkcs12SafeContentsBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SafeContentsBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContents SafeContents { get { throw null; } } + } + public sealed partial class Pkcs12SecretBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SecretBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory SecretValue { get { throw null; } } + public System.Security.Cryptography.Oid GetSecretType() { throw null; } + } + public sealed partial class Pkcs12ShroudedKeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12ShroudedKeyBag(System.ReadOnlyMemory encryptedPkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncryptedPkcs8PrivateKey { get { throw null; } } + } + public sealed partial class Pkcs8PrivateKeyInfo + { + public Pkcs8PrivateKeyInfo(System.Security.Cryptography.Oid algorithmId, System.Nullable> algorithmParameters, System.ReadOnlyMemory privateKey, bool skipCopies = false) { } + public System.Security.Cryptography.Oid AlgorithmId { get { throw null; } } + public System.Nullable> AlgorithmParameters { get { throw null; } } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory PrivateKeyBytes { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Create(System.Security.Cryptography.AsymmetricAlgorithm privateKey) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Decode(System.ReadOnlyMemory source, out int bytesRead, bool skipCopy = false) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan passwordBytes, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan password, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public byte[] Encode() { throw null; } + public byte[] Encrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public byte[] Encrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + } public partial class Pkcs9AttributeObject : System.Security.Cryptography.AsnEncodedData { public Pkcs9AttributeObject() { } @@ -204,6 +318,13 @@ namespace System.Security.Cryptography.Pkcs public string DocumentName { get { throw null; } } public override void CopyFrom(System.Security.Cryptography.AsnEncodedData asnEncodedData) { } } + public sealed partial class Pkcs9LocalKeyId : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject + { + public Pkcs9LocalKeyId() { } + public Pkcs9LocalKeyId(byte[] keyId) { } + public Pkcs9LocalKeyId(System.ReadOnlySpan keyId) { } + public System.ReadOnlyMemory KeyId { get { throw null; } } + } public sealed partial class Pkcs9MessageDigest : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject { public Pkcs9MessageDigest() { } @@ -259,6 +380,56 @@ namespace System.Security.Cryptography.Pkcs KeyTransport = 1, Unknown = 0, } + public sealed partial class Rfc3161TimestampRequest + { + internal Rfc3161TimestampRequest() { } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public System.Security.Cryptography.Oid RequestedPolicyId { get { throw null; } } + public bool RequestSignerCertificate { get { throw null; } } + public int Version { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromData(System.ReadOnlySpan data, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.Oid hashAlgorithmId, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampToken ProcessResponse(System.ReadOnlyMemory responseBytes, out int bytesConsumed) { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest request, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Rfc3161TimestampToken + { + internal Rfc3161TimestampToken() { } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo TokenInfo { get { throw null; } } + public System.Security.Cryptography.Pkcs.SignedCms AsSignedCms() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampToken token, out int bytesConsumed) { throw null; } + public bool VerifySignatureForData(System.ReadOnlySpan data, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.Oid hashAlgorithmId, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + } + public sealed partial class Rfc3161TimestampTokenInfo + { + public Rfc3161TimestampTokenInfo(System.Security.Cryptography.Oid policyId, System.Security.Cryptography.Oid hashAlgorithmId, System.ReadOnlyMemory messageHash, System.ReadOnlyMemory serialNumber, System.DateTimeOffset timestamp, System.Nullable accuracyInMicroseconds = default(System.Nullable), bool isOrdering = false, System.Nullable> nonce = default(System.Nullable>), System.Nullable> timestampAuthorityName = default(System.Nullable>), System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { } + public System.Nullable AccuracyInMicroseconds { get { throw null; } } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public bool IsOrdering { get { throw null; } } + public System.Security.Cryptography.Oid PolicyId { get { throw null; } } + public System.DateTimeOffset Timestamp { get { throw null; } } + public int Version { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.ReadOnlyMemory GetSerialNumber() { throw null; } + public System.Nullable> GetTimestampAuthorityName() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo timestampTokenInfo, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } public sealed partial class SignedCms { public SignedCms() { } diff --git a/external/api-snapshot/profiles/monotouch/Facades/System.Security.Cryptography.Pkcs.cs b/external/api-snapshot/profiles/monotouch/Facades/System.Security.Cryptography.Pkcs.cs index a89a42aa95..b1c3768d96 100644 --- a/external/api-snapshot/profiles/monotouch/Facades/System.Security.Cryptography.Pkcs.cs +++ b/external/api-snapshot/profiles/monotouch/Facades/System.Security.Cryptography.Pkcs.cs @@ -21,14 +21,28 @@ [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipient))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientCollection))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientEnumerator))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsSigner))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.ContentInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.EnvelopedCms))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyAgreeRecipientInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyTransRecipientInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Builder))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12CertBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Info))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12KeyBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContents))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SecretBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9AttributeObject))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9ContentType))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentDescription))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentName))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9LocalKeyId))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9MessageDigest))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9SigningTime))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.PublicKeyInfo))] @@ -36,6 +50,13 @@ [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoCollection))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoEnumerator))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoType))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampToken))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignedCms))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfo))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoCollection))] +[assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoEnumerator))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifier))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKey))] [assembly:System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKeyType))] diff --git a/external/api-snapshot/profiles/monotouch/System.Security.cs b/external/api-snapshot/profiles/monotouch/System.Security.cs index 1411008d2f..6e4d5675a4 100644 --- a/external/api-snapshot/profiles/monotouch/System.Security.cs +++ b/external/api-snapshot/profiles/monotouch/System.Security.cs @@ -173,6 +173,120 @@ namespace System.Security.Cryptography.Pkcs public override System.Security.Cryptography.Pkcs.SubjectIdentifier RecipientIdentifier { get { throw null; } } public override int Version { get { throw null; } } } + public sealed partial class Pkcs12Builder + { + public Pkcs12Builder() { } + public bool IsSealed { get { throw null; } } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, string password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsUnencrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { } + public byte[] Encode() { throw null; } + public void SealWithMac(System.ReadOnlySpan password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithMac(string password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithoutIntegrity() { } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12CertBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12CertBag(System.Security.Cryptography.Oid certificateType, System.ReadOnlyMemory encodedCertificate) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncodedCertificate { get { throw null; } } + public bool IsX509Certificate { get { throw null; } } + public System.Security.Cryptography.X509Certificates.X509Certificate2 GetCertificate() { throw null; } + public System.Security.Cryptography.Oid GetCertificateType() { throw null; } + } + public enum Pkcs12ConfidentialityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12Info + { + internal Pkcs12Info() { } + public System.Collections.ObjectModel.ReadOnlyCollection AuthenticatedSafe { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode IntegrityMode { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs12Info Decode(System.ReadOnlyMemory encodedBytes, out int bytesConsumed, bool skipCopy = false) { throw null; } + public bool VerifyMac(System.ReadOnlySpan password) { throw null; } + public bool VerifyMac(string password) { throw null; } + } + public enum Pkcs12IntegrityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12KeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12KeyBag(System.ReadOnlyMemory pkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory Pkcs8PrivateKey { get { throw null; } } + } + public abstract partial class Pkcs12SafeBag + { + protected Pkcs12SafeBag(string bagIdValue, System.ReadOnlyMemory encodedBagValue, bool skipCopy = false) { } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory EncodedBagValue { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.Oid GetBagId() { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12SafeContents + { + public Pkcs12SafeContents() { } + public System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode ConfidentialityMode { get { throw null; } } + public bool IsReadOnly { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12CertBag AddCertificate(System.Security.Cryptography.X509Certificates.X509Certificate2 certificate) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12KeyBag AddKeyUnencrypted(System.Security.Cryptography.AsymmetricAlgorithm key) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag AddNestedContents(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { throw null; } + public void AddSafeBag(System.Security.Cryptography.Pkcs.Pkcs12SafeBag safeBag) { } + public System.Security.Cryptography.Pkcs.Pkcs12SecretBag AddSecret(System.Security.Cryptography.Oid secretType, System.ReadOnlyMemory secretValue) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, string password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public void Decrypt(byte[] passwordBytes) { } + public void Decrypt(System.ReadOnlySpan passwordBytes) { } + public void Decrypt(System.ReadOnlySpan password) { } + public void Decrypt(string password) { } + public System.Collections.Generic.IEnumerable GetBags() { throw null; } + } + public sealed partial class Pkcs12SafeContentsBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SafeContentsBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContents SafeContents { get { throw null; } } + } + public sealed partial class Pkcs12SecretBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SecretBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory SecretValue { get { throw null; } } + public System.Security.Cryptography.Oid GetSecretType() { throw null; } + } + public sealed partial class Pkcs12ShroudedKeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12ShroudedKeyBag(System.ReadOnlyMemory encryptedPkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncryptedPkcs8PrivateKey { get { throw null; } } + } + public sealed partial class Pkcs8PrivateKeyInfo + { + public Pkcs8PrivateKeyInfo(System.Security.Cryptography.Oid algorithmId, System.Nullable> algorithmParameters, System.ReadOnlyMemory privateKey, bool skipCopies = false) { } + public System.Security.Cryptography.Oid AlgorithmId { get { throw null; } } + public System.Nullable> AlgorithmParameters { get { throw null; } } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory PrivateKeyBytes { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Create(System.Security.Cryptography.AsymmetricAlgorithm privateKey) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Decode(System.ReadOnlyMemory source, out int bytesRead, bool skipCopy = false) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan passwordBytes, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan password, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public byte[] Encode() { throw null; } + public byte[] Encrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public byte[] Encrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + } public partial class Pkcs9AttributeObject : System.Security.Cryptography.AsnEncodedData { public Pkcs9AttributeObject() { } @@ -204,6 +318,13 @@ namespace System.Security.Cryptography.Pkcs public string DocumentName { get { throw null; } } public override void CopyFrom(System.Security.Cryptography.AsnEncodedData asnEncodedData) { } } + public sealed partial class Pkcs9LocalKeyId : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject + { + public Pkcs9LocalKeyId() { } + public Pkcs9LocalKeyId(byte[] keyId) { } + public Pkcs9LocalKeyId(System.ReadOnlySpan keyId) { } + public System.ReadOnlyMemory KeyId { get { throw null; } } + } public sealed partial class Pkcs9MessageDigest : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject { public Pkcs9MessageDigest() { } @@ -259,6 +380,56 @@ namespace System.Security.Cryptography.Pkcs KeyTransport = 1, Unknown = 0, } + public sealed partial class Rfc3161TimestampRequest + { + internal Rfc3161TimestampRequest() { } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public System.Security.Cryptography.Oid RequestedPolicyId { get { throw null; } } + public bool RequestSignerCertificate { get { throw null; } } + public int Version { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromData(System.ReadOnlySpan data, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.Oid hashAlgorithmId, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampToken ProcessResponse(System.ReadOnlyMemory responseBytes, out int bytesConsumed) { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest request, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Rfc3161TimestampToken + { + internal Rfc3161TimestampToken() { } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo TokenInfo { get { throw null; } } + public System.Security.Cryptography.Pkcs.SignedCms AsSignedCms() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampToken token, out int bytesConsumed) { throw null; } + public bool VerifySignatureForData(System.ReadOnlySpan data, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.Oid hashAlgorithmId, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + } + public sealed partial class Rfc3161TimestampTokenInfo + { + public Rfc3161TimestampTokenInfo(System.Security.Cryptography.Oid policyId, System.Security.Cryptography.Oid hashAlgorithmId, System.ReadOnlyMemory messageHash, System.ReadOnlyMemory serialNumber, System.DateTimeOffset timestamp, System.Nullable accuracyInMicroseconds = default(System.Nullable), bool isOrdering = false, System.Nullable> nonce = default(System.Nullable>), System.Nullable> timestampAuthorityName = default(System.Nullable>), System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { } + public System.Nullable AccuracyInMicroseconds { get { throw null; } } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public bool IsOrdering { get { throw null; } } + public System.Security.Cryptography.Oid PolicyId { get { throw null; } } + public System.DateTimeOffset Timestamp { get { throw null; } } + public int Version { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.ReadOnlyMemory GetSerialNumber() { throw null; } + public System.Nullable> GetTimestampAuthorityName() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo timestampTokenInfo, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } public sealed partial class SignedCms { public SignedCms() { } diff --git a/external/api-snapshot/profiles/net_4_x/System.Security.cs b/external/api-snapshot/profiles/net_4_x/System.Security.cs index 463934b943..aff2ff28d8 100644 --- a/external/api-snapshot/profiles/net_4_x/System.Security.cs +++ b/external/api-snapshot/profiles/net_4_x/System.Security.cs @@ -208,6 +208,120 @@ namespace System.Security.Cryptography.Pkcs public override System.Security.Cryptography.Pkcs.SubjectIdentifier RecipientIdentifier { get { throw null; } } public override int Version { get { throw null; } } } + public sealed partial class Pkcs12Builder + { + public Pkcs12Builder() { } + public bool IsSealed { get { throw null; } } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsEncrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents, string password, System.Security.Cryptography.PbeParameters pbeParameters) { } + public void AddSafeContentsUnencrypted(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { } + public byte[] Encode() { throw null; } + public void SealWithMac(System.ReadOnlySpan password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithMac(string password, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, int iterationCount) { } + public void SealWithoutIntegrity() { } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12CertBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12CertBag(System.Security.Cryptography.Oid certificateType, System.ReadOnlyMemory encodedCertificate) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncodedCertificate { get { throw null; } } + public bool IsX509Certificate { get { throw null; } } + public System.Security.Cryptography.X509Certificates.X509Certificate2 GetCertificate() { throw null; } + public System.Security.Cryptography.Oid GetCertificateType() { throw null; } + } + public enum Pkcs12ConfidentialityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12Info + { + internal Pkcs12Info() { } + public System.Collections.ObjectModel.ReadOnlyCollection AuthenticatedSafe { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode IntegrityMode { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs12Info Decode(System.ReadOnlyMemory encodedBytes, out int bytesConsumed, bool skipCopy = false) { throw null; } + public bool VerifyMac(System.ReadOnlySpan password) { throw null; } + public bool VerifyMac(string password) { throw null; } + } + public enum Pkcs12IntegrityMode + { + None = 1, + Password = 2, + PublicKey = 3, + Unknown = 0, + } + public sealed partial class Pkcs12KeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12KeyBag(System.ReadOnlyMemory pkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory Pkcs8PrivateKey { get { throw null; } } + } + public abstract partial class Pkcs12SafeBag + { + protected Pkcs12SafeBag(string bagIdValue, System.ReadOnlyMemory encodedBagValue, bool skipCopy = false) { } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory EncodedBagValue { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.Oid GetBagId() { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Pkcs12SafeContents + { + public Pkcs12SafeContents() { } + public System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode ConfidentialityMode { get { throw null; } } + public bool IsReadOnly { get { throw null; } } + public System.Security.Cryptography.Pkcs.Pkcs12CertBag AddCertificate(System.Security.Cryptography.X509Certificates.X509Certificate2 certificate) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12KeyBag AddKeyUnencrypted(System.Security.Cryptography.AsymmetricAlgorithm key) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag AddNestedContents(System.Security.Cryptography.Pkcs.Pkcs12SafeContents safeContents) { throw null; } + public void AddSafeBag(System.Security.Cryptography.Pkcs.Pkcs12SafeBag safeBag) { } + public System.Security.Cryptography.Pkcs.Pkcs12SecretBag AddSecret(System.Security.Cryptography.Oid secretType, System.ReadOnlyMemory secretValue) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, byte[] passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag AddShroudedKey(System.Security.Cryptography.AsymmetricAlgorithm key, string password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public void Decrypt(byte[] passwordBytes) { } + public void Decrypt(System.ReadOnlySpan passwordBytes) { } + public void Decrypt(System.ReadOnlySpan password) { } + public void Decrypt(string password) { } + public System.Collections.Generic.IEnumerable GetBags() { throw null; } + } + public sealed partial class Pkcs12SafeContentsBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SafeContentsBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.Security.Cryptography.Pkcs.Pkcs12SafeContents SafeContents { get { throw null; } } + } + public sealed partial class Pkcs12SecretBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + internal Pkcs12SecretBag() : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory SecretValue { get { throw null; } } + public System.Security.Cryptography.Oid GetSecretType() { throw null; } + } + public sealed partial class Pkcs12ShroudedKeyBag : System.Security.Cryptography.Pkcs.Pkcs12SafeBag + { + public Pkcs12ShroudedKeyBag(System.ReadOnlyMemory encryptedPkcs8PrivateKey, bool skipCopy = false) : base (default(string), default(System.ReadOnlyMemory), default(bool)) { } + public System.ReadOnlyMemory EncryptedPkcs8PrivateKey { get { throw null; } } + } + public sealed partial class Pkcs8PrivateKeyInfo + { + public Pkcs8PrivateKeyInfo(System.Security.Cryptography.Oid algorithmId, System.Nullable> algorithmParameters, System.ReadOnlyMemory privateKey, bool skipCopies = false) { } + public System.Security.Cryptography.Oid AlgorithmId { get { throw null; } } + public System.Nullable> AlgorithmParameters { get { throw null; } } + public System.Security.Cryptography.CryptographicAttributeObjectCollection Attributes { get { throw null; } } + public System.ReadOnlyMemory PrivateKeyBytes { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Create(System.Security.Cryptography.AsymmetricAlgorithm privateKey) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo Decode(System.ReadOnlyMemory source, out int bytesRead, bool skipCopy = false) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan passwordBytes, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public static System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo DecryptAndDecode(System.ReadOnlySpan password, System.ReadOnlyMemory source, out int bytesRead) { throw null; } + public byte[] Encode() { throw null; } + public byte[] Encrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public byte[] Encrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan passwordBytes, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + public bool TryEncrypt(System.ReadOnlySpan password, System.Security.Cryptography.PbeParameters pbeParameters, System.Span destination, out int bytesWritten) { throw null; } + } public partial class Pkcs9AttributeObject : System.Security.Cryptography.AsnEncodedData { public Pkcs9AttributeObject() { } @@ -239,6 +353,13 @@ namespace System.Security.Cryptography.Pkcs public string DocumentName { get { throw null; } } public override void CopyFrom(System.Security.Cryptography.AsnEncodedData asnEncodedData) { } } + public sealed partial class Pkcs9LocalKeyId : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject + { + public Pkcs9LocalKeyId() { } + public Pkcs9LocalKeyId(byte[] keyId) { } + public Pkcs9LocalKeyId(System.ReadOnlySpan keyId) { } + public System.ReadOnlyMemory KeyId { get { throw null; } } + } public sealed partial class Pkcs9MessageDigest : System.Security.Cryptography.Pkcs.Pkcs9AttributeObject { public Pkcs9MessageDigest() { } @@ -294,6 +415,56 @@ namespace System.Security.Cryptography.Pkcs KeyTransport = 1, Unknown = 0, } + public sealed partial class Rfc3161TimestampRequest + { + internal Rfc3161TimestampRequest() { } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public System.Security.Cryptography.Oid RequestedPolicyId { get { throw null; } } + public bool RequestSignerCertificate { get { throw null; } } + public int Version { get { throw null; } } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromData(System.ReadOnlySpan data, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromHash(System.ReadOnlyMemory hash, System.Security.Cryptography.Oid hashAlgorithmId, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public static System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest CreateFromSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, System.Security.Cryptography.Oid requestedPolicyId = null, System.Nullable> nonce = default(System.Nullable>), bool requestSignerCertificates = false, System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { throw null; } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampToken ProcessResponse(System.ReadOnlyMemory responseBytes, out int bytesConsumed) { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest request, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } + public sealed partial class Rfc3161TimestampToken + { + internal Rfc3161TimestampToken() { } + public System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo TokenInfo { get { throw null; } } + public System.Security.Cryptography.Pkcs.SignedCms AsSignedCms() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampToken token, out int bytesConsumed) { throw null; } + public bool VerifySignatureForData(System.ReadOnlySpan data, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.HashAlgorithmName hashAlgorithm, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForHash(System.ReadOnlySpan hash, System.Security.Cryptography.Oid hashAlgorithmId, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + public bool VerifySignatureForSignerInfo(System.Security.Cryptography.Pkcs.SignerInfo signerInfo, out System.Security.Cryptography.X509Certificates.X509Certificate2 signerCertificate, System.Security.Cryptography.X509Certificates.X509Certificate2Collection extraCandidates = null) { throw null; } + } + public sealed partial class Rfc3161TimestampTokenInfo + { + public Rfc3161TimestampTokenInfo(System.Security.Cryptography.Oid policyId, System.Security.Cryptography.Oid hashAlgorithmId, System.ReadOnlyMemory messageHash, System.ReadOnlyMemory serialNumber, System.DateTimeOffset timestamp, System.Nullable accuracyInMicroseconds = default(System.Nullable), bool isOrdering = false, System.Nullable> nonce = default(System.Nullable>), System.Nullable> timestampAuthorityName = default(System.Nullable>), System.Security.Cryptography.X509Certificates.X509ExtensionCollection extensions = null) { } + public System.Nullable AccuracyInMicroseconds { get { throw null; } } + public bool HasExtensions { get { throw null; } } + public System.Security.Cryptography.Oid HashAlgorithmId { get { throw null; } } + public bool IsOrdering { get { throw null; } } + public System.Security.Cryptography.Oid PolicyId { get { throw null; } } + public System.DateTimeOffset Timestamp { get { throw null; } } + public int Version { get { throw null; } } + public byte[] Encode() { throw null; } + public System.Security.Cryptography.X509Certificates.X509ExtensionCollection GetExtensions() { throw null; } + public System.ReadOnlyMemory GetMessageHash() { throw null; } + public System.Nullable> GetNonce() { throw null; } + public System.ReadOnlyMemory GetSerialNumber() { throw null; } + public System.Nullable> GetTimestampAuthorityName() { throw null; } + public static bool TryDecode(System.ReadOnlyMemory encodedBytes, out System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo timestampTokenInfo, out int bytesConsumed) { throw null; } + public bool TryEncode(System.Span destination, out int bytesWritten) { throw null; } + } public sealed partial class SignedCms { public SignedCms() { } diff --git a/mcs/build/common/Consts.cs b/mcs/build/common/Consts.cs index 64b264585e..62a5bb2ac4 100644 --- a/mcs/build/common/Consts.cs +++ b/mcs/build/common/Consts.cs @@ -41,7 +41,7 @@ static partial class Consts // Use these assembly version constants to make code more maintainable. // - public const string MonoVersion = "6.8.0.87"; + public const string MonoVersion = "6.8.0.91"; public const string MonoCompany = "Mono development team"; public const string MonoProduct = "Mono Common Language Infrastructure"; public const string MonoCopyright = "(c) Various Mono authors"; diff --git a/mcs/class/Facades/System.Security.Cryptography.Pkcs/TypeForwarders.cs b/mcs/class/Facades/System.Security.Cryptography.Pkcs/TypeForwarders.cs index db96723509..0054d951a8 100644 --- a/mcs/class/Facades/System.Security.Cryptography.Pkcs/TypeForwarders.cs +++ b/mcs/class/Facades/System.Security.Cryptography.Pkcs/TypeForwarders.cs @@ -27,14 +27,28 @@ [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipient))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientCollection))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsRecipientEnumerator))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.CmsSigner))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.ContentInfo))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.EnvelopedCms))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyAgreeRecipientInfo))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.KeyTransRecipientInfo))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Builder))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12CertBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ConfidentialityMode))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12Info))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12IntegrityMode))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12KeyBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContents))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SafeContentsBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12SecretBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs12ShroudedKeyBag))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs8PrivateKeyInfo))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9AttributeObject))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9ContentType))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentDescription))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9DocumentName))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9LocalKeyId))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9MessageDigest))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Pkcs9SigningTime))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.PublicKeyInfo))] @@ -42,10 +56,15 @@ [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoCollection))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoEnumerator))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.RecipientInfoType))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampRequest))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampToken))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.Rfc3161TimestampTokenInfo))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignedCms))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfo))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoCollection))] +[assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SignerInfoEnumerator))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifier))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKey))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierOrKeyType))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Pkcs.SubjectIdentifierType))] [assembly: System.Runtime.CompilerServices.TypeForwardedToAttribute(typeof(System.Security.Cryptography.Xml.X509IssuerSerial))] - - diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Builder.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Builder.NotSupported.cs new file mode 100644 index 0000000000..95ce4ff018 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Builder.NotSupported.cs @@ -0,0 +1,115 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Enables the creation of PKCS#12 PFX data values. This class cannot be inherited. + public sealed class Pkcs12Builder { + /// Gets a value that indicates whether the PFX data has been sealed. + /// A value that indicates whether the PFX data has been sealed. + public bool IsSealed { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Add contents to the PFX in an bundle encrypted with a byte-based password from a byte array. + /// The contents to add to the PFX. + /// The byte array to use as a password when encrypting the contents. + /// The password-based encryption (PBE) parameters to use when encrypting the contents. + /// The or parameter is . + /// The parameter value is already encrypted. + /// The PFX is already sealed ( is ). + /// + /// indicates that should be used, which requires -based passwords. + public void AddSafeContentsEncrypted (Pkcs12SafeContents safeContents, byte[] passwordBytes, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Add contents to the PFX in an bundle encrypted with a byte-based password from a span. + /// The contents to add to the PFX. + /// The byte span to use as a password when encrypting the contents. + /// The password-based encryption (PBE) parameters to use when encrypting the contents. + /// The or parameter is . + /// The parameter value is already encrypted. + /// The PFX is already sealed ( is ). + /// + /// indicates that should be used, which requires -based passwords. + public void AddSafeContentsEncrypted (Pkcs12SafeContents safeContents, ReadOnlySpan passwordBytes, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Add contents to the PFX in an bundle encrypted with a char-based password from a span. + /// The contents to add to the PFX. + /// The span to use as a password when encrypting the contents. + /// The password-based encryption (PBE) parameters to use when encrypting the contents. + /// The or parameter is . + /// The parameter value is already encrypted. + /// The PFX is already sealed ( is ). + public void AddSafeContentsEncrypted (Pkcs12SafeContents safeContents, ReadOnlySpan password, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Add contents to the PFX in an bundle encrypted with a char-based password from a string. + /// The contents to add to the PFX. + /// The string to use as a password when encrypting the contents. + /// The password-based encryption (PBE) parameters to use when encrypting the contents. + /// The or parameter is . + /// The parameter value is already encrypted. + /// The PFX is already sealed ( is ). + public void AddSafeContentsEncrypted (Pkcs12SafeContents safeContents, string password, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Add contents to the PFX without encrypting them. + /// The contents to add to the PFX. + /// The parameter is . + /// The PFX is already sealed ( is ). + public void AddSafeContentsUnencrypted (Pkcs12SafeContents safeContents) { + throw new PlatformNotSupportedException (); + } + + /// Encodes the contents of a sealed PFX and returns it as a byte array. + /// A byte array representing the encoded form of the PFX. + /// The PFX is not sealed ( is ). + public byte[] Encode () { + throw new PlatformNotSupportedException (); + } + + /// Seals the PFX against further changes by applying a password-based Message Authentication Code (MAC) over the contents with a password from a span. + /// The password to use as a key for computing the MAC. + /// The hash algorithm to use when computing the MAC. + /// The iteration count for the Key Derivation Function (KDF) used in computing the MAC. + /// The parameter is less than or equal to 0. + /// The PFX is already sealed ( is ). + public void SealWithMac (ReadOnlySpan password, HashAlgorithmName hashAlgorithm, int iterationCount) { + throw new PlatformNotSupportedException (); + } + + /// Seals the PFX against further changes by applying a password-based Message Authentication Code (MAC) over the contents with a password from a string. + /// The password to use as a key for computing the MAC. + /// The hash algorithm to use when computing the MAC. + /// The iteration count for the Key Derivation Function (KDF) used in computing the MAC. + /// The parameter is less than or equal to 0. + /// The PFX is already sealed ( is ). + public void SealWithMac (string password, HashAlgorithmName hashAlgorithm, int iterationCount) { + throw new PlatformNotSupportedException (); + } + + /// Seals the PFX from further changes without applying tamper-protection. + /// The PFX is already sealed ( is ). + public void SealWithoutIntegrity () { + throw new PlatformNotSupportedException (); + } + + /// Attempts to encode the contents of a sealed PFX into a provided buffer. + /// The byte span to receive the PKCS#12 PFX data. + /// When this method returns, contains a value that indicates the number of bytes written to . This parameter is treated as uninitialized. + /// + /// if is big enough to receive the output; otherwise, . + /// The PFX is not sealed ( is ). + public bool TryEncode (Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12CertBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12CertBag.NotSupported.cs new file mode 100644 index 0000000000..8e074f7386 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12CertBag.NotSupported.cs @@ -0,0 +1,50 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; +using System.Security.Cryptography.X509Certificates; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the PKCS#12 CertBag. This class cannot be inherited. + public sealed class Pkcs12CertBag : Pkcs12SafeBag { + /// Gets the uninterpreted certificate contents of the CertSafeBag. + /// The uninterpreted certificate contents of the CertSafeBag. + public ReadOnlyMemory EncodedCertificate { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets a value indicating whether the content type of the encoded certificate value is the X.509 public key certificate content type. + /// + /// if the content type is the X.509 public key certificate content type (1.2.840.113549.1.9.22.1); otherwise, . + public bool IsX509Certificate { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Initializes a new instance of the class using the specified certificate type and encoding. + /// The Object Identifier (OID) for the certificate type. + /// The encoded certificate value. + /// The parameter is . + /// The parameter does not represent a single ASN.1 BER-encoded value. + public Pkcs12CertBag (Oid certificateType, ReadOnlyMemory encodedCertificate) + : base (null, default(ReadOnlyMemory)) { + throw new PlatformNotSupportedException (); + } + + /// Gets the contents of the CertBag interpreted as an X.509 public key certificate. + /// A certificate decoded from the contents of the CertBag. + /// The content type is not the X.509 public key certificate content type. + /// The contents were not valid for the X.509 certificate content type. + public X509Certificate2 GetCertificate () { + throw new PlatformNotSupportedException (); + } + + /// Gets the Object Identifier (OID) which identifies the content type of the encoded certificte value. + /// The Object Identifier (OID) which identifies the content type of the encoded certificate value. + public Oid GetCertificateType () { + throw new PlatformNotSupportedException (); + } + } +} \ No newline at end of file diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ConfidentialityMode.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ConfidentialityMode.NotSupported.cs new file mode 100644 index 0000000000..5cf164d444 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ConfidentialityMode.NotSupported.cs @@ -0,0 +1,13 @@ +namespace System.Security.Cryptography.Pkcs { + /// Represents the kind of encryption associated with a PKCS#12 SafeContents value. + public enum Pkcs12ConfidentialityMode { + /// The SafeContents value is not encrypted. + None = 1, + /// The SafeContents value is encrypted with a password. + Password = 2, + /// The SafeContents value is encrypted using public key cryptography. + PublicKey = 3, + /// The kind of encryption applied to the SafeContents is unknown or could not be determined. + Unknown = 0 + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Info.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Info.NotSupported.cs new file mode 100644 index 0000000000..69c7a2b434 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12Info.NotSupported.cs @@ -0,0 +1,59 @@ +using System; +using System.Collections.ObjectModel; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the data from PKCS#12 PFX contents. This class cannot be inherited. + public sealed class Pkcs12Info { + /// Gets a read-only collection of the SafeContents values present in the PFX AuthenticatedSafe. + /// A read-only collection of the SafeContents values present in the PFX AuthenticatedSafe. + public ReadOnlyCollection AuthenticatedSafe { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets a value that indicates the type of tamper protection provided for the contents. + /// One of the enumeration members that indicates the type of tamper protection provided for the contents. + public Pkcs12IntegrityMode IntegrityMode { + get { + throw new PlatformNotSupportedException (); + } + } + + internal Pkcs12Info () { + throw new PlatformNotSupportedException (); + } + + /// Reads the provided data as a PKCS#12 PFX and returns an object view of the contents. + /// The data to interpret as a PKCS#12 PFX. + /// When this method returns, contains a value that indicates the number of bytes from which were read by this method. This parameter is treated as uninitialized. + /// + /// to store without making a defensive copy; otherwise, . The default is . + /// An object view of the PKCS#12 PFX decoded from the input. + /// The contents of the parameter were not successfully decoded as a PKCS#12 PFX. + public static Pkcs12Info Decode (ReadOnlyMemory encodedBytes, out int bytesConsumed, bool skipCopy = false) { + throw new PlatformNotSupportedException (); + } + + /// Attempts to verify the integrity of the contents with a password represented by a . + /// The password to use to attempt to verify integrity. + /// + /// if the password successfully verifies the integrity of the contents; if the password is not correct or the contents have been altered. + /// The value is not . + /// The hash algorithm option specified by the PKCS#12 PFX contents could not be identified or is not supported by this platform. + public bool VerifyMac (ReadOnlySpan password) { + throw new PlatformNotSupportedException (); + } + + /// Attempts to verify the integrity of the contents with a password represented by a . + /// The password to use to attempt to verify integrity. + /// + /// if the password successfully verifies the integrity of the contents; if the password is not correct or the contents have been altered. + /// The value is not . + /// The hash algorithm option specified by the PKCS#12 PFX contents could not be identified or is not supported by this platform. + public bool VerifyMac (string password) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12IntegrityMode.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12IntegrityMode.NotSupported.cs new file mode 100644 index 0000000000..dc6ffb6740 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12IntegrityMode.NotSupported.cs @@ -0,0 +1,13 @@ +namespace System.Security.Cryptography.Pkcs { + /// Represents the type of anti-tampering applied to a PKCS#12 PFX value. + public enum Pkcs12IntegrityMode { + /// The PKCS#12 PFX value is not protected from tampering. + None = 1, + /// The PKCS#12 PFX value is protected from tampering with a Message Authentication Code (MAC) keyed with a password. + Password = 2, + /// The PKCS#12 PFX value is protected from tampering with a digital signature using public key cryptography. + PublicKey = 3, + /// The type of anti-tampering applied to the PKCS#12 PFX is unknown or could not be determined. + Unknown = 0 + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12KeyBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12KeyBag.NotSupported.cs new file mode 100644 index 0000000000..5c9e6bf55a --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12KeyBag.NotSupported.cs @@ -0,0 +1,25 @@ +using System; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the KeyBag from PKCS#12, a container whose contents are a PKCS#8 PrivateKeyInfo. This class cannot be inherited. + public sealed class Pkcs12KeyBag : Pkcs12SafeBag { + /// Gets a memory value containing the PKCS#8 PrivateKeyInfo value transported by this bag. + /// A memory value containing the PKCS#8 PrivateKeyInfo value transported by this bag. + public ReadOnlyMemory Pkcs8PrivateKey { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Initializes a new instance of the from an existing encoded PKCS#8 PrivateKeyInfo value. + /// A BER-encoded PKCS#8 PrivateKeyInfo value. + /// + /// to store without making a defensive copy; otherwise, . The default is . + /// The parameter does not represent a single ASN.1 BER-encoded value. + public Pkcs12KeyBag (ReadOnlyMemory pkcs8PrivateKey, bool skipCopy = false) + : base (null, default(ReadOnlyMemory)) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeBag.NotSupported.cs new file mode 100644 index 0000000000..1f32260e3c --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeBag.NotSupported.cs @@ -0,0 +1,57 @@ +using System; +using System.Security.Cryptography; + +namespace System.Security.Cryptography.Pkcs { + /// Defines the core behavior of a SafeBag value from the PKCS#12 specification and provides a base for derived classes. + public abstract class Pkcs12SafeBag { + /// Gets the modifiable collection of attributes to encode with the SafeBag value. + /// The modifiable collection of attributes to encode with the SafeBag value. + public CryptographicAttributeObjectCollection Attributes { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets the ASN.1 BER encoding of the contents of this SafeBag. + /// The ASN.1 BER encoding of the contents of this SafeBag. + public ReadOnlyMemory EncodedBagValue { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Called from constructors in derived classes to initialize the class. + /// The Object Identifier (OID), in dotted decimal form, indicating the data type of this SafeBag. + /// The ASN.1 BER encoded value of the SafeBag contents. + /// + /// to store without making a defensive copy; otherwise, . The default is . + /// The parameter is or the empty string. + /// The parameter does not represent a single ASN.1 BER-encoded value. + protected Pkcs12SafeBag (string bagIdValue, ReadOnlyMemory encodedBagValue, bool skipCopy = false) { + throw new PlatformNotSupportedException (); + } + + /// Encodes the SafeBag value and returns it as a byte array. + /// A byte array representing the encoded form of the SafeBag. + /// The object identifier value passed to the constructor was invalid. + public byte[] Encode () { + throw new PlatformNotSupportedException (); + } + + /// Gets the Object Identifier (OID) identifying the content type of this SafeBag. + /// The Object Identifier (OID) identifying the content type of this SafeBag. + public Oid GetBagId () { + throw new PlatformNotSupportedException (); + } + + /// Attempts to encode the SafeBag value into a provided buffer. + /// The byte span to receive the encoded SafeBag value. + /// When this method returns, contains a value that indicates the number of bytes written to . This parameter is treated as uninitialized. + /// + /// if is big enough to receive the output; otherwise, . + /// The object identifier value passed to the constructor was invalid. + public bool TryEncode (Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContents.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContents.NotSupported.cs new file mode 100644 index 0000000000..3a02a792cb --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContents.NotSupported.cs @@ -0,0 +1,171 @@ +using System; +using System.Collections.Generic; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; +using System.Security.Cryptography.X509Certificates; + +namespace System.Security.Cryptography.Pkcs { + /// Represents a PKCS#12 SafeContents value. This class cannot be inherited. + public sealed class Pkcs12SafeContents { + /// Gets a value that indicates the type of encryption applied to the contents. + /// One of the enumeration values that indicates the type of encryption applied to the contents. The default value is . + public Pkcs12ConfidentialityMode ConfidentialityMode { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets a value that indicates whether this instance in a read-only state. + /// + /// if this value is in a read-only state; otherwise, . The default value is . + public bool IsReadOnly { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Adds a certificate to the SafeContents via a new and returns the newly created bag instance. + /// The certificate to add. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The parameter is in an invalid state. + public Pkcs12CertBag AddCertificate (X509Certificate2 certificate) { + throw new PlatformNotSupportedException (); + } + + /// Adds an asymmetric private key to the SafeContents via a new and returns the newly created bag instance. + /// The asymmetric private key to add. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The key export failed. + public Pkcs12KeyBag AddKeyUnencrypted (AsymmetricAlgorithm key) { + throw new PlatformNotSupportedException (); + } + + /// Adds a nested SafeContents to the SafeContents via a new and returns the newly created bag instance. + /// The nested contents to add to the SafeContents. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// The parameter is encrypted. + /// This instance is read-only. + public Pkcs12SafeContentsBag AddNestedContents (Pkcs12SafeContents safeContents) { + throw new PlatformNotSupportedException (); + } + + /// Adds a SafeBag to the SafeContents. + /// The SafeBag value to add. + /// The parameter is . + /// This instance is read-only. + public void AddSafeBag (Pkcs12SafeBag safeBag) { + throw new PlatformNotSupportedException (); + } + + /// Adds an ASN.1 BER-encoded value with a specified type identifier to the SafeContents via a new and returns the newly created bag instance. + /// The Object Identifier (OID) which identifies the data type of the secret value. + /// The BER-encoded value representing the secret to add. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The parameter does not represent a single ASN.1 BER-encoded value. + public Pkcs12SecretBag AddSecret (Oid secretType, ReadOnlyMemory secretValue) { + throw new PlatformNotSupportedException (); + } + + /// Adds an encrypted asymmetric private key to the SafeContents via a new from a byte-based password in an array and returns the newly created bag instance. + /// The asymmetric private key to add. + /// The bytes to use as a password when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The key export failed. + public Pkcs12ShroudedKeyBag AddShroudedKey (AsymmetricAlgorithm key, byte[] passwordBytes, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Adds an encrypted asymmetric private key to the SafeContents via a new from a byte-based password in a span and returns the newly created bag instance. + /// The asymmetric private key to add. + /// The bytes to use as a password when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The key export failed. + public Pkcs12ShroudedKeyBag AddShroudedKey (AsymmetricAlgorithm key, ReadOnlySpan passwordBytes, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Adds an encrypted asymmetric private key to the SafeContents via a new from a character-based password in a span and returns the newly created bag instance. + /// The asymmetric private key to add. + /// The password to use when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The key export failed. + public Pkcs12ShroudedKeyBag AddShroudedKey (AsymmetricAlgorithm key, ReadOnlySpan password, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Adds an encrypted asymmetric private key to the SafeContents via a new from a character-based password in a string and returns the newly created bag instance. + /// The asymmetric private key to add. + /// The password to use when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The bag instance which was added to the SafeContents. + /// The parameter is . + /// This instance is read-only. + /// The key export failed. + public Pkcs12ShroudedKeyBag AddShroudedKey (AsymmetricAlgorithm key, string password, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the contents of this SafeContents value using a byte-based password from an array. + /// The bytes to use as a password for decrypting the encrypted contents. + /// The property is not . + /// The password is incorrect. + /// -or- + /// The contents were not successfully decrypted. + public void Decrypt (byte[] passwordBytes) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the contents of this SafeContents value using a byte-based password from a span. + /// The bytes to use as a password for decrypting the encrypted contents. + /// The property is not . + /// The password is incorrect. + /// -or- + /// The contents were not successfully decrypted. + public void Decrypt (ReadOnlySpan passwordBytes) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the contents of this SafeContents value using a character-based password from a span. + /// The password to use for decrypting the encrypted contents. + /// The property is not . + /// The password is incorrect. + /// -or- + /// The contents were not successfully decrypted. + public void Decrypt (ReadOnlySpan password) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the contents of this SafeContents value using a character-based password from a string. + /// The password to use for decrypting the encrypted contents. + /// The property is not . + /// The password is incorrect. + /// -or- + /// The contents were not successfully decrypted. + public void Decrypt (string password) { + throw new PlatformNotSupportedException (); + } + + /// Gets an enumerable representation of the SafeBag values contained within the SafeContents. + /// An enumerable representation of the SafeBag values contained within the SafeContents. + /// The contents are encrypted. + public IEnumerable GetBags () { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContentsBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContentsBag.NotSupported.cs new file mode 100644 index 0000000000..15f10f14d6 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SafeContentsBag.NotSupported.cs @@ -0,0 +1,20 @@ +using System; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the SafeContentsBag from PKCS#12, a container whose contents are a PKCS#12 SafeContents value. This class cannot be inherited. + public sealed class Pkcs12SafeContentsBag : Pkcs12SafeBag { + /// Gets the SafeContents value contained within this bag. + /// The SafeContents value contained within this bag. + public Pkcs12SafeContents SafeContents { + get { + throw new PlatformNotSupportedException (); + } + } + + internal Pkcs12SafeContentsBag () + : base (null, default(ReadOnlyMemory)) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SecretBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SecretBag.NotSupported.cs new file mode 100644 index 0000000000..6555267740 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12SecretBag.NotSupported.cs @@ -0,0 +1,27 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the SecretBag from PKCS#12, a container whose contents are arbitrary data with a type identifier. This class cannot be inherited. + public sealed class Pkcs12SecretBag : Pkcs12SafeBag { + /// Gets a memory value containing the BER-encoded contents of the bag. + /// A memory value containing the BER-encoded contents of the bag. + public ReadOnlyMemory SecretValue { + get { + throw new PlatformNotSupportedException (); + } + } + + internal Pkcs12SecretBag () + : base (null, default(ReadOnlyMemory)) { + throw new PlatformNotSupportedException (); + } + + /// Gets the Object Identifier (OID) which identifies the data type of the secret value. + /// The Object Identifier (OID) which identifies the data type of the secret value. + public Oid GetSecretType () { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ShroudedKeyBag.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ShroudedKeyBag.NotSupported.cs new file mode 100644 index 0000000000..14bc04c105 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs12ShroudedKeyBag.NotSupported.cs @@ -0,0 +1,25 @@ +using System; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the ShroudedKeyBag from PKCS#12, a container whose contents are a PKCS#8 EncryptedPrivateKeyInfo. This class cannot be inherited. + public sealed class Pkcs12ShroudedKeyBag : Pkcs12SafeBag { + /// Gets a memory value containing the PKCS#8 EncryptedPrivateKeyInfo value transported by this bag. + /// A memory value containing the PKCS#8 EncryptedPrivateKeyInfo value transported by this bag. + public ReadOnlyMemory EncryptedPkcs8PrivateKey { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Initializes a new instance of the from an existing encoded PKCS#8 EncryptedPrivateKeyInfo value. + /// A BER-encoded PKCS#8 EncryptedPrivateKeyInfo value. + /// + /// to store without making a defensive copy; otherwise, . The default is . + /// The parameter does not represent a single ASN.1 BER-encoded value. + public Pkcs12ShroudedKeyBag (ReadOnlyMemory encryptedPkcs8PrivateKey, bool skipCopy = false) + : base (null, default(ReadOnlyMemory)) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs8PrivateKeyInfo.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs8PrivateKeyInfo.NotSupported.cs new file mode 100644 index 0000000000..719c890da9 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs8PrivateKeyInfo.NotSupported.cs @@ -0,0 +1,149 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Enables the inspection of and creation of PKCS#8 PrivateKeyInfo and EncryptedPrivateKeyInfo values. This class cannot be inherited. + public sealed class Pkcs8PrivateKeyInfo { + /// Gets the Object Identifier (OID) value identifying the algorithm this key is for. + /// The Object Identifier (OID) value identifying the algorithm this key is for. + public Oid AlgorithmId { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets a memory value containing the BER-encoded algorithm parameters associated with this key. + /// A memory value containing the BER-encoded algorithm parameters associated with this key, or if no parameters were present. + public ReadOnlyMemory? AlgorithmParameters { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets the modifiable collection of attributes for this private key. + /// The modifiable collection of attributes to encode with the private key. + public CryptographicAttributeObjectCollection Attributes { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Gets a memory value that represents the algorithm-specific encoded private key. + /// A memory value that represents the algorithm-specific encoded private key. + public ReadOnlyMemory PrivateKeyBytes { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Initializes a new instance of the class. + /// The Object Identifier (OID) identifying the asymmetric algorithm this key is for. + /// The BER-encoded algorithm parameters associated with this key, or to omit algorithm parameters when encoding. + /// The algorithm-specific encoded private key. + /// + /// to store and without making a defensive copy; otherwise, . The default is . + /// The parameter is . + /// The parameter is not , empty, or a single BER-encoded value. + public Pkcs8PrivateKeyInfo (Oid algorithmId, ReadOnlyMemory? algorithmParameters, ReadOnlyMemory privateKey, bool skipCopies = false) { + throw new PlatformNotSupportedException (); + } + + /// Exports a specified key as a PKCS#8 PrivateKeyInfo and returns its decoded interpretation. + /// The private key to represent in a PKCS#8 PrivateKeyInfo. + /// The decoded interpretation of the exported PKCS#8 PrivateKeyInfo. + /// The parameter is . + public static Pkcs8PrivateKeyInfo Create (AsymmetricAlgorithm privateKey) { + throw new PlatformNotSupportedException (); + } + + /// Reads the provided data as a PKCS#8 PrivateKeyInfo and returns an object view of the contents. + /// The data to interpret as a PKCS#8 PrivateKeyInfo value. + /// When this method returns, contains a value that indicates the number of bytes read from . This parameter is treated as uninitialized. + /// + /// to store without making a defensive copy; otherwise, . The default is . + /// An object view of the contents decoded as a PKCS#8 PrivateKeyInfo. + /// The contents of the parameter were not successfully decoded as a PKCS#8 PrivateKeyInfo. + public static Pkcs8PrivateKeyInfo Decode (ReadOnlyMemory source, out int bytesRead, bool skipCopy = false) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the provided data using the provided byte-based password and decodes the output into an object view of the PKCS#8 PrivateKeyInfo. + /// The bytes to use as a password when decrypting the key material. + /// The data to read as a PKCS#8 EncryptedPrivateKeyInfo structure in the ASN.1-BER encoding. + /// When this method returns, contains a value that indicates the number of bytes read from . This parameter is treated as uninitialized. + /// An object view of the contents decrypted decoded as a PKCS#8 PrivateKeyInfo. + /// The password is incorrect. + /// -or- + /// The contents of indicate the Key Derivation Function (KDF) to apply is the legacy PKCS#12 KDF, which requires -based passwords. + /// -or- + /// The contents of do not represent an ASN.1-BER-encoded PKCS#8 EncryptedPrivateKeyInfo structure. + public static Pkcs8PrivateKeyInfo DecryptAndDecode (ReadOnlySpan passwordBytes, ReadOnlyMemory source, out int bytesRead) { + throw new PlatformNotSupportedException (); + } + + /// Decrypts the provided data using the provided character-based password and decodes the output into an object view of the PKCS#8 PrivateKeyInfo. + /// The password to use when decrypting the key material. + /// The bytes of a PKCS#8 EncryptedPrivateKeyInfo structure in the ASN.1-BER encoding. + /// When this method returns, contains a value that indicates the number of bytes read from . This parameter is treated as uninitialized. + /// An object view of the contents decrypted decoded as a PKCS#8 PrivateKeyInfo. + public static Pkcs8PrivateKeyInfo DecryptAndDecode (ReadOnlySpan password, ReadOnlyMemory source, out int bytesRead) { + throw new PlatformNotSupportedException (); + } + + /// Encodes the property data of this instance as a PKCS#8 PrivateKeyInfo and returns the encoding as a byte array. + /// A byte array representing the encoded form of the PKCS#8 PrivateKeyInfo. + public byte[] Encode () { + throw new PlatformNotSupportedException(); + } + + /// Produces a PKCS#8 EncryptedPrivateKeyInfo from the property contents of this object after encrypting with the specified byte-based password and encryption parameters. + /// The bytes to use as a password when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// A byte array containing the encoded form of the PKCS#8 EncryptedPrivateKeyInfo. + /// + /// indicates that should be used, which requires -based passwords. + public byte[] Encrypt (ReadOnlySpan passwordBytes, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Produces a PKCS#8 EncryptedPrivateKeyInfo from the property contents of this object after encrypting with the specified character-based password and encryption parameters. + /// The password to use when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// A byte array containing the encoded form of the PKCS#8 EncryptedPrivateKeyInfo. + public byte[] Encrypt (ReadOnlySpan password, PbeParameters pbeParameters) { + throw new PlatformNotSupportedException (); + } + + /// Attempts to encode the property data of this instance as a PKCS#8 PrivateKeyInfo, writing the results into a provided buffer. + /// The byte span to receive the PKCS#8 PrivateKeyInfo data. + /// When this method returns, contains a value that indicates the number of bytes written to . This parameter is treated as uninitialized. + /// + /// if is big enough to receive the output; otherwise, . + public bool TryEncode (Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + + /// Attempts to produce a PKCS#8 EncryptedPrivateKeyInfo from the property contents of this object after encrypting with the specified byte-based password and encryption parameters, writing the results into a provided buffer. + /// The bytes to use as a password when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The byte span to receive the PKCS#8 EncryptedPrivateKeyInfo data. + /// When this method returns, contains a value that indicates the number of bytes written to . This parameter is treated as uninitialized. + /// + /// if is big enough to receive the output; otherwise, . + public bool TryEncrypt (ReadOnlySpan passwordBytes, PbeParameters pbeParameters, Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + + /// Attempts to produce a PKCS#8 EncryptedPrivateKeyInfo from the property contents of this object after encrypting with the specified character-based password and encryption parameters, writing the result into a provided buffer. + /// The password to use when encrypting the key material. + /// The password-based encryption (PBE) parameters to use when encrypting the key material. + /// The byte span to receive the PKCS#8 EncryptedPrivateKeyInfo data. + /// When this method returns, contains a value that indicates the number of bytes written to . This parameter is treated as uninitialized. + /// + /// if is big enough to receive the output; otherwise, . + public bool TryEncrypt (ReadOnlySpan password, PbeParameters pbeParameters, Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs9LocalKeyId.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs9LocalKeyId.NotSupported.cs new file mode 100644 index 0000000000..20aa61ea49 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Pkcs9LocalKeyId.NotSupported.cs @@ -0,0 +1,32 @@ +using System; +using System.Security.Cryptography.Pkcs; + +namespace System.Security.Cryptography.Pkcs { + /// Represents the LocalKeyId attribute from PKCS#9. + public sealed class Pkcs9LocalKeyId : Pkcs9AttributeObject { + /// Gets a memory value containing the key identifier from this attribute. + /// A memory value containing the key identifier from this attribute. + public ReadOnlyMemory KeyId { + get { + throw new PlatformNotSupportedException (); + } + } + + /// Initializes a new instance of the class with an empty key identifier value. + public Pkcs9LocalKeyId () { + throw new PlatformNotSupportedException (); + } + + /// Initializes a new instance of the class with a key identifier specified by a byte array. + /// A byte array containing the key identifier. + public Pkcs9LocalKeyId (byte[] keyId) { + throw new PlatformNotSupportedException (); + } + + /// Initializes a new instance of the class with a key identifier specified by a byte span. + /// A byte array containing the key identifier. + public Pkcs9LocalKeyId (ReadOnlySpan keyId) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampRequest.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampRequest.NotSupported.cs new file mode 100644 index 0000000000..46175aa8c7 --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampRequest.NotSupported.cs @@ -0,0 +1,120 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; +using System.Security.Cryptography.X509Certificates; + +namespace System.Security.Cryptography.Pkcs { + public sealed class Rfc3161TimestampRequest { + public bool HasExtensions { + get { + throw new PlatformNotSupportedException (); + } + } + + public Oid HashAlgorithmId { + get { + throw new PlatformNotSupportedException (); + } + } + + public Oid RequestedPolicyId { + get { + throw new PlatformNotSupportedException (); + } + } + + public bool RequestSignerCertificate { + get { + throw new PlatformNotSupportedException (); + } + } + + public int Version { + get { + throw new PlatformNotSupportedException (); + } + } + + internal Rfc3161TimestampRequest () { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + /// + /// + /// + public static Rfc3161TimestampRequest CreateFromData (ReadOnlySpan data, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + /// + /// + /// + public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { + throw new PlatformNotSupportedException (); + } + + /// Create a timestamp request using a pre-computed hash value. + /// The pre-computed hash value to be timestamped. + /// The Object Identifier (OID) for the hash algorithm that produced . + /// The Object Identifier (OID) for a timestamp policy the Timestamp Authority (TSA) should use, or to express no preference. + /// An optional nonce (number used once) to uniquely identify this request to pair it with the response. The value is interpreted as an unsigned big-endian integer and may be normalized to the encoding format. + /// + /// to indicate the Timestamp Authority (TSA) must include the signing certificate in the issued timestamp token; otherwise, . + /// RFC3161 extensions to present with the request. + /// An representing the chosen values. + public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, Oid hashAlgorithmId, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + /// + /// + /// + public static Rfc3161TimestampRequest CreateFromSignerInfo (SignerInfo signerInfo, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { + throw new PlatformNotSupportedException (); + } + + public byte[] Encode () { + throw new PlatformNotSupportedException (); + } + + public X509ExtensionCollection GetExtensions () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory GetMessageHash () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory? GetNonce () { + throw new PlatformNotSupportedException (); + } + + /// + /// + public Rfc3161TimestampToken ProcessResponse (ReadOnlyMemory responseBytes, out int bytesConsumed) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + public static bool TryDecode (ReadOnlyMemory encodedBytes, out Rfc3161TimestampRequest request, out int bytesConsumed) { + throw new PlatformNotSupportedException (); + } + + /// + /// + public bool TryEncode (Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampToken.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampToken.NotSupported.cs new file mode 100644 index 0000000000..3e10b1f82f --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampToken.NotSupported.cs @@ -0,0 +1,61 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; +using System.Security.Cryptography.X509Certificates; + +namespace System.Security.Cryptography.Pkcs { + public sealed class Rfc3161TimestampToken { + public Rfc3161TimestampTokenInfo TokenInfo { + get { + throw new PlatformNotSupportedException (); + } + } + + internal Rfc3161TimestampToken () { + throw new PlatformNotSupportedException (); + } + + /// Gets a Signed Cryptographic Message Syntax (CMS) representation of the RFC3161 timestamp token. + /// The representation of the . + public SignedCms AsSignedCms () { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + public static bool TryDecode (ReadOnlyMemory encodedBytes, out Rfc3161TimestampToken token, out int bytesConsumed) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + public bool VerifySignatureForData (ReadOnlySpan data, out X509Certificate2 signerCertificate, X509Certificate2Collection extraCandidates = null) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + /// + public bool VerifySignatureForHash (ReadOnlySpan hash, HashAlgorithmName hashAlgorithm, out X509Certificate2 signerCertificate, X509Certificate2Collection extraCandidates = null) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + /// + public bool VerifySignatureForHash (ReadOnlySpan hash, Oid hashAlgorithmId, out X509Certificate2 signerCertificate, X509Certificate2Collection extraCandidates = null) { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + public bool VerifySignatureForSignerInfo (SignerInfo signerInfo, out X509Certificate2 signerCertificate, X509Certificate2Collection extraCandidates = null) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampTokenInfo.NotSupported.cs b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampTokenInfo.NotSupported.cs new file mode 100644 index 0000000000..094114c7fb --- /dev/null +++ b/mcs/class/System.Security/System.Security.Cryptography.Pkcs/Rfc3161TimestampTokenInfo.NotSupported.cs @@ -0,0 +1,101 @@ +using System; +using System.Security.Cryptography; +using System.Security.Cryptography.Pkcs; +using System.Security.Cryptography.X509Certificates; + +namespace System.Security.Cryptography.Pkcs { + public sealed class Rfc3161TimestampTokenInfo { + public long? AccuracyInMicroseconds { + get { + throw new PlatformNotSupportedException (); + } + } + + public bool HasExtensions { + get { + throw new PlatformNotSupportedException (); + } + } + + public Oid HashAlgorithmId { + get { + throw new PlatformNotSupportedException (); + } + } + + public bool IsOrdering { + get { + throw new PlatformNotSupportedException (); + } + } + + public Oid PolicyId { + get { + throw new PlatformNotSupportedException (); + } + } + + public DateTimeOffset Timestamp { + get { + throw new PlatformNotSupportedException (); + } + } + + public int Version { + get { + throw new PlatformNotSupportedException (); + } + } + + /// + /// + /// + /// + /// + /// + /// + /// + /// + /// + public Rfc3161TimestampTokenInfo (Oid policyId, Oid hashAlgorithmId, ReadOnlyMemory messageHash, ReadOnlyMemory serialNumber, DateTimeOffset timestamp, long? accuracyInMicroseconds = default(long?), bool isOrdering = false, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), ReadOnlyMemory? timestampAuthorityName = default(ReadOnlyMemory?), X509ExtensionCollection extensions = null) { + throw new PlatformNotSupportedException (); + } + + public byte[] Encode () { + throw new PlatformNotSupportedException (); + } + + public X509ExtensionCollection GetExtensions () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory GetMessageHash () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory? GetNonce () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory GetSerialNumber () { + throw new PlatformNotSupportedException (); + } + + public ReadOnlyMemory? GetTimestampAuthorityName () { + throw new PlatformNotSupportedException (); + } + + /// + /// + /// + public static bool TryDecode (ReadOnlyMemory encodedBytes, out Rfc3161TimestampTokenInfo timestampTokenInfo, out int bytesConsumed) { + throw new PlatformNotSupportedException (); + } + + /// + /// + public bool TryEncode (Span destination, out int bytesWritten) { + throw new PlatformNotSupportedException (); + } + } +} diff --git a/mcs/class/System.Security/common_System.Security.dll.sources b/mcs/class/System.Security/common_System.Security.dll.sources index bc12f3f931..edd3535fd3 100644 --- a/mcs/class/System.Security/common_System.Security.dll.sources +++ b/mcs/class/System.Security/common_System.Security.dll.sources @@ -99,5 +99,25 @@ System.Security.Cryptography.Pkcs/EnvelopedCms.cs ../../../external/corefx/src/System.Security.Cryptography.Pkcs/src/System/Security/Cryptography/Pkcs/SignerInfoCollection.cs ../../../external/corefx/src/System.Security.Cryptography.Pkcs/src/System/Security/Cryptography/Pkcs/SignerInfoEnumerator.cs + +# System.Security.Cryptography.Pkcs NotSupported +System.Security.Cryptography.Pkcs/Pkcs12Builder.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12CertBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12ConfidentialityMode.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12Info.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12IntegrityMode.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12KeyBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12SafeBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12SafeContents.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12SafeContentsBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12SecretBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs12ShroudedKeyBag.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs8PrivateKeyInfo.NotSupported.cs +System.Security.Cryptography.Pkcs/Pkcs9LocalKeyId.NotSupported.cs +System.Security.Cryptography.Pkcs/Rfc3161TimestampRequest.NotSupported.cs +System.Security.Cryptography.Pkcs/Rfc3161TimestampToken.NotSupported.cs +System.Security.Cryptography.Pkcs/Rfc3161TimestampTokenInfo.NotSupported.cs + + # System.Security.Cryptography.Xml ../../../external/corefx/src/System.Security.Cryptography.Pkcs/src/System/Security/Cryptography/Xml/X509IssuerSerial.cs diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id index 4931381741..3847566ee4 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id @@ -1 +1 @@ -54d97180aa78f4c8d673a5da0326d2733aa8fdac \ No newline at end of file +26a2a15d84ab705d9603477933803c2fd5cfab6d \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id index ace4d166d6..160ad0a461 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id @@ -1 +1 @@ -beccb5ae6dbcd4b168c68fb63b9417d52b95bc8a \ No newline at end of file +7e73ac6c04ee1995b54ead0695da7c8cbfb6c59b \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id index 521c24400f..8cf4b15a77 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id @@ -1 +1 @@ -f8f9ccfedec878c09fa0e0d5fd4b87912e952330 \ No newline at end of file +0b366b0a13c515ebcd20e4d14ed9b83977a6b680 \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id index 0003055058..a9ef9bbdba 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id @@ -1 +1 @@ -17ee4ef88336af007120be5b8f3db670de143b1d \ No newline at end of file +07a7a45b552266960f85910389454d93ad9a2474 \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id index 0df8edd93e..77055e5f0a 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id @@ -1 +1 @@ -e440f6ac09f22b1db2fe660ed68ae2f423dffe24 \ No newline at end of file +b2488f2fefe9afe6c0fa3ab3de84319ea41578b5 \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id index 2704731753..10d0b7c2e3 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id @@ -1 +1 @@ -abf11d020725669c6a911d5edbb6835d9cf97957 \ No newline at end of file +e6c5c116f3bab5df0446b3ed15441dcff6834311 \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id index 69f304c6a7..cc9133d9f3 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id @@ -1 +1 @@ -7d9290d77fb963197df93b5e5d2d1b286898bac9 \ No newline at end of file +d6cb383615452883ab12e783dbbc8b4f09ad14ef \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id index a14b06698e..dc6e0e4deb 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id @@ -1 +1 @@ -ace7ea7edcb443539836ff6217f6018f16f5e61b \ No newline at end of file +5961d6ba89061d1992e97727d718c5507b6be6df \ No newline at end of file diff --git a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id index df74e23cca..672aff0ef7 100644 --- a/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-linux/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id @@ -1 +1 @@ -955d03cb282a3dc4d8355f27d6f910d7d4778722 \ No newline at end of file +3f02ac40f078876c32b5aeaca6c1db8644e4c7ea \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id index 4931381741..3847566ee4 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id @@ -1 +1 @@ -54d97180aa78f4c8d673a5da0326d2733aa8fdac \ No newline at end of file +26a2a15d84ab705d9603477933803c2fd5cfab6d \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id index ace4d166d6..160ad0a461 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id @@ -1 +1 @@ -beccb5ae6dbcd4b168c68fb63b9417d52b95bc8a \ No newline at end of file +7e73ac6c04ee1995b54ead0695da7c8cbfb6c59b \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id index 521c24400f..8cf4b15a77 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id @@ -1 +1 @@ -f8f9ccfedec878c09fa0e0d5fd4b87912e952330 \ No newline at end of file +0b366b0a13c515ebcd20e4d14ed9b83977a6b680 \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id index 0003055058..a9ef9bbdba 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id @@ -1 +1 @@ -17ee4ef88336af007120be5b8f3db670de143b1d \ No newline at end of file +07a7a45b552266960f85910389454d93ad9a2474 \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id index 0df8edd93e..77055e5f0a 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id @@ -1 +1 @@ -e440f6ac09f22b1db2fe660ed68ae2f423dffe24 \ No newline at end of file +b2488f2fefe9afe6c0fa3ab3de84319ea41578b5 \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id index 2704731753..10d0b7c2e3 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id @@ -1 +1 @@ -abf11d020725669c6a911d5edbb6835d9cf97957 \ No newline at end of file +e6c5c116f3bab5df0446b3ed15441dcff6834311 \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id index 69f304c6a7..cc9133d9f3 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id @@ -1 +1 @@ -7d9290d77fb963197df93b5e5d2d1b286898bac9 \ No newline at end of file +d6cb383615452883ab12e783dbbc8b4f09ad14ef \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id index a14b06698e..dc6e0e4deb 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id @@ -1 +1 @@ -ace7ea7edcb443539836ff6217f6018f16f5e61b \ No newline at end of file +5961d6ba89061d1992e97727d718c5507b6be6df \ No newline at end of file diff --git a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id index df74e23cca..672aff0ef7 100644 --- a/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-macos/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id @@ -1 +1 @@ -955d03cb282a3dc4d8355f27d6f910d7d4778722 \ No newline at end of file +3f02ac40f078876c32b5aeaca6c1db8644e4c7ea \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id index 4931381741..3847566ee4 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id @@ -1 +1 @@ -54d97180aa78f4c8d673a5da0326d2733aa8fdac \ No newline at end of file +26a2a15d84ab705d9603477933803c2fd5cfab6d \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id index ace4d166d6..160ad0a461 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id @@ -1 +1 @@ -beccb5ae6dbcd4b168c68fb63b9417d52b95bc8a \ No newline at end of file +7e73ac6c04ee1995b54ead0695da7c8cbfb6c59b \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id index 521c24400f..8cf4b15a77 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id @@ -1 +1 @@ -f8f9ccfedec878c09fa0e0d5fd4b87912e952330 \ No newline at end of file +0b366b0a13c515ebcd20e4d14ed9b83977a6b680 \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id index 0003055058..a9ef9bbdba 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id @@ -1 +1 @@ -17ee4ef88336af007120be5b8f3db670de143b1d \ No newline at end of file +07a7a45b552266960f85910389454d93ad9a2474 \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id index 0df8edd93e..77055e5f0a 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id @@ -1 +1 @@ -e440f6ac09f22b1db2fe660ed68ae2f423dffe24 \ No newline at end of file +b2488f2fefe9afe6c0fa3ab3de84319ea41578b5 \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id index 2704731753..10d0b7c2e3 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id @@ -1 +1 @@ -abf11d020725669c6a911d5edbb6835d9cf97957 \ No newline at end of file +e6c5c116f3bab5df0446b3ed15441dcff6834311 \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id index 69f304c6a7..cc9133d9f3 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id @@ -1 +1 @@ -7d9290d77fb963197df93b5e5d2d1b286898bac9 \ No newline at end of file +d6cb383615452883ab12e783dbbc8b4f09ad14ef \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id index a14b06698e..dc6e0e4deb 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id @@ -1 +1 @@ -ace7ea7edcb443539836ff6217f6018f16f5e61b \ No newline at end of file +5961d6ba89061d1992e97727d718c5507b6be6df \ No newline at end of file diff --git a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id index df74e23cca..672aff0ef7 100644 --- a/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-unix/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id @@ -1 +1 @@ -955d03cb282a3dc4d8355f27d6f910d7d4778722 \ No newline at end of file +3f02ac40f078876c32b5aeaca6c1db8644e4c7ea \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id index 4931381741..3847566ee4 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/Mono.Security.dll.REMOVED.git-id @@ -1 +1 @@ -54d97180aa78f4c8d673a5da0326d2733aa8fdac \ No newline at end of file +26a2a15d84ab705d9603477933803c2fd5cfab6d \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id index ace4d166d6..160ad0a461 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Configuration.dll.REMOVED.git-id @@ -1 +1 @@ -beccb5ae6dbcd4b168c68fb63b9417d52b95bc8a \ No newline at end of file +7e73ac6c04ee1995b54ead0695da7c8cbfb6c59b \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id index 0fa27d9c2b..cf52d7d156 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Core.dll.REMOVED.git-id @@ -1 +1 @@ -55660ad557ff73e9436949f751e82a5615aaac79 \ No newline at end of file +605407b5f834e6243ec7e4d1c606ee3093ec761c \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id index 0003055058..a9ef9bbdba 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.IO.Compression.dll.REMOVED.git-id @@ -1 +1 @@ -17ee4ef88336af007120be5b8f3db670de143b1d \ No newline at end of file +07a7a45b552266960f85910389454d93ad9a2474 \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id index 0df8edd93e..77055e5f0a 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Numerics.dll.REMOVED.git-id @@ -1 +1 @@ -e440f6ac09f22b1db2fe660ed68ae2f423dffe24 \ No newline at end of file +b2488f2fefe9afe6c0fa3ab3de84319ea41578b5 \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id index 2704731753..10d0b7c2e3 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Security.dll.REMOVED.git-id @@ -1 +1 @@ -abf11d020725669c6a911d5edbb6835d9cf97957 \ No newline at end of file +e6c5c116f3bab5df0446b3ed15441dcff6834311 \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id index 69f304c6a7..cc9133d9f3 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/System.Xml.dll.REMOVED.git-id @@ -1 +1 @@ -7d9290d77fb963197df93b5e5d2d1b286898bac9 \ No newline at end of file +d6cb383615452883ab12e783dbbc8b4f09ad14ef \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id index a14b06698e..dc6e0e4deb 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mcs.exe.REMOVED.git-id @@ -1 +1 @@ -ace7ea7edcb443539836ff6217f6018f16f5e61b \ No newline at end of file +5961d6ba89061d1992e97727d718c5507b6be6df \ No newline at end of file diff --git a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id index d67d6e7f4d..e8ac958c48 100644 --- a/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id +++ b/mcs/class/lib/monolite-win32/ABB721D6-116A-4555-B4FD-9248146D2051/mscorlib.dll.REMOVED.git-id @@ -1 +1 @@ -d2d41fd7d7c91c497ac19222c65d7e814c2b9c12 \ No newline at end of file +e970108f6344f0d10c972a097b236906ed451c6d \ No newline at end of file diff --git a/mono/mini/Makefile.am b/mono/mini/Makefile.am index 5f530661df..ef744067c8 100644 --- a/mono/mini/Makefile.am +++ b/mono/mini/Makefile.am @@ -74,7 +74,7 @@ TOOLS_RUNTIME = MONO_PATH=$(mcs_topdir)/class/lib/build $(top_builddir)/runtime/ INTERP_RUNTIME = $(MINI_RUNTIME) --interpreter RUNTIME_AOTCHECK = MONO_PATH="$(CLASS)$(PLATFORM_PATH_SEPARATOR)." $(RUNTIME_EXECUTABLE) -MCS = CSC_SDK_PATH_DISABLED= $(TOOLS_RUNTIME) $(CSC) -langversion:7.2 -nostdlib -unsafe -nowarn:0162 -nologo -noconfig -r:$(CLASS)/mscorlib.dll -r:$(CLASS)/System.dll -r:$(CLASS)/System.Core.dll +MCS = CSC_SDK_PATH_DISABLED= $(TOOLS_RUNTIME) $(CSC) -langversion:8.0 -nostdlib -unsafe -nowarn:0162 -nologo -noconfig -r:$(CLASS)/mscorlib.dll -r:$(CLASS)/System.dll -r:$(CLASS)/System.Core.dll ILASM = $(TOOLS_RUNTIME) $(mcs_topdir)/class/lib/build/ilasm.exe if !ENABLE_MSVC_ONLY diff --git a/mono/mini/Makefile.am.in b/mono/mini/Makefile.am.in index 5f530661df..ef744067c8 100755 --- a/mono/mini/Makefile.am.in +++ b/mono/mini/Makefile.am.in @@ -74,7 +74,7 @@ TOOLS_RUNTIME = MONO_PATH=$(mcs_topdir)/class/lib/build $(top_builddir)/runtime/ INTERP_RUNTIME = $(MINI_RUNTIME) --interpreter RUNTIME_AOTCHECK = MONO_PATH="$(CLASS)$(PLATFORM_PATH_SEPARATOR)." $(RUNTIME_EXECUTABLE) -MCS = CSC_SDK_PATH_DISABLED= $(TOOLS_RUNTIME) $(CSC) -langversion:7.2 -nostdlib -unsafe -nowarn:0162 -nologo -noconfig -r:$(CLASS)/mscorlib.dll -r:$(CLASS)/System.dll -r:$(CLASS)/System.Core.dll +MCS = CSC_SDK_PATH_DISABLED= $(TOOLS_RUNTIME) $(CSC) -langversion:8.0 -nostdlib -unsafe -nowarn:0162 -nologo -noconfig -r:$(CLASS)/mscorlib.dll -r:$(CLASS)/System.dll -r:$(CLASS)/System.Core.dll ILASM = $(TOOLS_RUNTIME) $(mcs_topdir)/class/lib/build/ilasm.exe if !ENABLE_MSVC_ONLY diff --git a/mono/mini/Makefile.in.REMOVED.git-id b/mono/mini/Makefile.in.REMOVED.git-id index 7336d1e6f8..81940f7541 100644 --- a/mono/mini/Makefile.in.REMOVED.git-id +++ b/mono/mini/Makefile.in.REMOVED.git-id @@ -1 +1 @@ -49bf90a7988012164677d07cf311bd8666dc7a12 \ No newline at end of file +4063da3bda37e24dd3262a3fdb6043dd76b696ca \ No newline at end of file diff --git a/mono/mini/gshared.cs b/mono/mini/gshared.cs index 93a7f5b0f7..f458de293d 100644 --- a/mono/mini/gshared.cs +++ b/mono/mini/gshared.cs @@ -2216,6 +2216,14 @@ public class Tests var res = (Nullable)iface.AMethod> (); return res == 42 ? 0 : 1; } + +#if !__MonoCS__ + public static int test_0_gsharedvt_out_dim () { + var c = new Outer(); + c.prop = new H (); + return (c.Foo () == "abcd") ? 0 : 1; + } +#endif } // #13191 @@ -2262,6 +2270,29 @@ internal struct SparseArrayBuilder public ArrayBuilder Markers => _markers; } +// #18276 +#if !__MonoCS__ +public class Outer { + public interface ID { + string Foo () { + return null; + } + } + + public ID prop; + + public string Foo () { + return prop?.Foo(); + } +} + +public class H : Outer.ID { + string Outer.ID.Foo () { + return "abcd"; + } +} +#endif + #if !__MOBILE__ public class GSharedTests : Tests { } diff --git a/mono/mini/method-to-ir.c.REMOVED.git-id b/mono/mini/method-to-ir.c.REMOVED.git-id index b309d47e3a..38df7eb0fc 100644 --- a/mono/mini/method-to-ir.c.REMOVED.git-id +++ b/mono/mini/method-to-ir.c.REMOVED.git-id @@ -1 +1 @@ -4005bf0c358a7796e4c9896c35433c7c5788561c \ No newline at end of file +ab4c722f347d7661f87e1ef9a8e7a18bddccca69 \ No newline at end of file diff --git a/mono/mini/mini-llvm.c.REMOVED.git-id b/mono/mini/mini-llvm.c.REMOVED.git-id index 4d95fb605a..0137bb259e 100644 --- a/mono/mini/mini-llvm.c.REMOVED.git-id +++ b/mono/mini/mini-llvm.c.REMOVED.git-id @@ -1 +1 @@ -9d251a99b293450d38049f7c98079126c5adac74 \ No newline at end of file +e034f5213f337e2f3959498e89400b78822d9a0b \ No newline at end of file diff --git a/mono/mini/version.h b/mono/mini/version.h index a560cc2418..c5ae8cf275 100644 --- a/mono/mini/version.h +++ b/mono/mini/version.h @@ -1 +1 @@ -#define FULL_VERSION "explicit/df42020" +#define FULL_VERSION "explicit/6a246d09" diff --git a/mono/unit-tests/Makefile.in b/mono/unit-tests/Makefile.in index 3a1340eb62..72e4985504 100644 --- a/mono/unit-tests/Makefile.in +++ b/mono/unit-tests/Makefile.in @@ -1598,10 +1598,10 @@ distclean-generic: maintainer-clean-generic: @echo "This command is intended for maintainers to use" @echo "it deletes files that may require special tools to rebuild." -@CROSS_COMPILE_TRUE@test-local: -@HOST_WIN32_TRUE@test-local: @CROSS_COMPILE_TRUE@clean-local: @HOST_WIN32_TRUE@clean-local: +@CROSS_COMPILE_TRUE@test-local: +@HOST_WIN32_TRUE@test-local: clean: clean-am clean-am: clean-checkPROGRAMS clean-generic clean-libtool clean-local \ diff --git a/msvc/Makefile.in b/msvc/Makefile.in index 3f7935e25c..7bd8058722 100644 --- a/msvc/Makefile.in +++ b/msvc/Makefile.in @@ -526,8 +526,8 @@ distclean-generic: maintainer-clean-generic: @echo "This command is intended for maintainers to use" @echo "it deletes files that may require special tools to rebuild." -@ENABLE_MSVC_FALSE@install-exec-local: @ENABLE_MSVC_FALSE@clean-local: +@ENABLE_MSVC_FALSE@install-exec-local: clean: clean-am clean-am: clean-generic clean-libtool clean-local mostlyclean-am diff --git a/po/mcs/de.gmo b/po/mcs/de.gmo index ba92a421ffb314a265d8becc79194253f8dde12c..752ba434a56c7d54a365439831ef4396dddfd7ac 100644 GIT binary patch delta 20 bcmbQIHBW29Q!aK31p^B!1M|&qxQw^}O1}nu delta 20 bcmbQIHBW29Q!aLM1p^B!1B=aXxQw^}O1TDo diff --git a/po/mcs/de.po.REMOVED.git-id b/po/mcs/de.po.REMOVED.git-id index e7e265527d..8c541d5e6d 100644 --- a/po/mcs/de.po.REMOVED.git-id +++ b/po/mcs/de.po.REMOVED.git-id @@ -1 +1 @@ -00c07aa61c23bedf050091b50cfca69e8369bdfc \ No newline at end of file +2da5426a84bb8eb2d735bf647e23a90dc2177044 \ No newline at end of file diff --git a/po/mcs/es.gmo b/po/mcs/es.gmo index 2dc12787e03973073274d092ab824e6f9de4a20d..c83c3ca3e394544fa84ce40066938749991308f1 100644 GIT binary patch delta 20 bcmX?Ef3kjqo+7)2f`NsVf%#@r#VK+CQQro$ delta 20 bcmX?Ef3kjqo+7)sf`NsVfyHK1#VK+CQP~Ew diff --git a/po/mcs/es.po.REMOVED.git-id b/po/mcs/es.po.REMOVED.git-id index 5bcb764148..9dcb4aead2 100644 --- a/po/mcs/es.po.REMOVED.git-id +++ b/po/mcs/es.po.REMOVED.git-id @@ -1 +1 @@ -ea43f1caa3df80b21cd4c20aaa37ea7f5c96ea2c \ No newline at end of file +a6f009262ac0ad65754acec34bfa177346c80c5d \ No newline at end of file diff --git a/po/mcs/ja.gmo b/po/mcs/ja.gmo index 394d2ef5c0f417b1bb4a84e2e5de51e7e09df8cc..566440648b1cb1c21a88182dfa4a5bd3b2d09647 100644 GIT binary patch delta 22 dcmeyri1Gg-#tj_m>=p_J7FGu4oB7oXv;bi-2M+)M delta 22 dcmeyri1Gg-#tj_m?B)sv7FGrpoB7oXv;bi%2M+)M diff --git a/po/mcs/ja.po.REMOVED.git-id b/po/mcs/ja.po.REMOVED.git-id index 814af84dde..addc3b87ed 100644 --- a/po/mcs/ja.po.REMOVED.git-id +++ b/po/mcs/ja.po.REMOVED.git-id @@ -1 +1 @@ -8bb781479bfb5127613ba2f9250eed1da2e41432 \ No newline at end of file +6bed6ea4cf5e5d04a1849d666ae050453a564c4c \ No newline at end of file diff --git a/po/mcs/mcs.pot b/po/mcs/mcs.pot index 761bc64971..95bdbacbd7 100644 --- a/po/mcs/mcs.pot +++ b/po/mcs/mcs.pot @@ -6,9 +6,9 @@ #, fuzzy msgid "" msgstr "" -"Project-Id-Version: mono 6.8.0.87\n" +"Project-Id-Version: mono 6.8.0.91\n" "Report-Msgid-Bugs-To: http://www.mono-project.com/Bugs\n" -"POT-Creation-Date: 2020-01-07 08:08+0000\n" +"POT-Creation-Date: 2020-01-08 08:07+0000\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" diff --git a/po/mcs/pt_BR.gmo b/po/mcs/pt_BR.gmo index ea17fdc1727fef1c603864d6d415cdc1f1e54a9b..1f02b24efc74ef6d171dfa3f90db47e554e6cb47 100644 GIT binary patch delta 22 ecmaF1gXP%{mJM-J*)0?dEUXO7H>XZzYzF{tC5 diff --git a/po/mcs/pt_BR.po.REMOVED.git-id b/po/mcs/pt_BR.po.REMOVED.git-id index 82f5520c1a..62807832ce 100644 --- a/po/mcs/pt_BR.po.REMOVED.git-id +++ b/po/mcs/pt_BR.po.REMOVED.git-id @@ -1 +1 @@ -1f347b6c10e542f310be1586ba1ca7e2f5d46d79 \ No newline at end of file +c2cd4fde6148c81e7c22572477e41d9586eca92a \ No newline at end of file