Skip to content

Commit

Permalink
Get rid of NETSTANDARD1_3 and NETSTANDARD1_6 #ifdef's
Browse files Browse the repository at this point in the history
  • Loading branch information
jstedfast committed Dec 28, 2023
1 parent 9369932 commit d70707d
Show file tree
Hide file tree
Showing 7 changed files with 0 additions and 25 deletions.
2 changes: 0 additions & 2 deletions MailKit/Net/NetworkStream.cs
Original file line number Diff line number Diff line change
Expand Up @@ -147,9 +147,7 @@ void Cleanup ()
void Disconnect ()
{
try {
#if !NETSTANDARD1_3 && !NETSTANDARD1_6
Socket.Disconnect (false);
#endif
Socket.Dispose ();
} catch {
return;
Expand Down
2 changes: 0 additions & 2 deletions MailKit/Net/Proxy/HttpsProxyClient.cs
Original file line number Diff line number Diff line change
Expand Up @@ -198,10 +198,8 @@ bool ValidateRemoteCertificate (object sender, X509Certificate certificate, X509

if (ServerCertificateValidationCallback != null) {
valid = ServerCertificateValidationCallback (ProxyHost, certificate, chain, sslPolicyErrors);
#if !NETSTANDARD1_3 && !NETSTANDARD1_6
} else if (ServicePointManager.ServerCertificateValidationCallback != null) {
valid = ServicePointManager.ServerCertificateValidationCallback (ProxyHost, certificate, chain, sslPolicyErrors);
#endif
} else {
valid = sslPolicyErrors == SslPolicyErrors.None;
}
Expand Down
2 changes: 0 additions & 2 deletions MailKit/Net/Smtp/SmtpClient.cs
Original file line number Diff line number Diff line change
Expand Up @@ -544,10 +544,8 @@ bool ValidateRemoteCertificate (object sender, X509Certificate certificate, X509

if (ServerCertificateValidationCallback != null) {
valid = ServerCertificateValidationCallback (uri.Host, certificate, chain, sslPolicyErrors);
#if !NETSTANDARD1_3 && !NETSTANDARD1_6
} else if (ServicePointManager.ServerCertificateValidationCallback != null) {
valid = ServicePointManager.ServerCertificateValidationCallback (uri.Host, certificate, chain, sslPolicyErrors);
#endif
} else {
valid = DefaultServerCertificateValidationCallback (uri.Host, certificate, chain, sslPolicyErrors);
}
Expand Down
8 changes: 0 additions & 8 deletions MailKit/Security/SaslMechanism.cs
Original file line number Diff line number Diff line change
Expand Up @@ -35,10 +35,6 @@

using MailKit.Net;

#if NETSTANDARD1_3 || NETSTANDARD1_6
using MD5 = MimeKit.Cryptography.MD5;
#endif

namespace MailKit.Security {
/// <summary>
/// A SASL authentication mechanism.
Expand Down Expand Up @@ -699,11 +695,7 @@ public static string SaslPrep (string s)
}
}

#if !NETSTANDARD1_3 && !NETSTANDARD1_6
return builder.ToString ().Normalize (NormalizationForm.FormKC);
#else
return builder.ToString ();
#endif
}

internal static string GenerateEntropy (int n)
Expand Down
5 changes: 0 additions & 5 deletions MailKit/Security/SaslMechanismCramMd5.cs
Original file line number Diff line number Diff line change
Expand Up @@ -28,12 +28,7 @@
using System.Net;
using System.Text;
using System.Threading;

#if NETSTANDARD1_3 || NETSTANDARD1_6
using MD5 = MimeKit.Cryptography.MD5;
#else
using System.Security.Cryptography;
#endif

namespace MailKit.Security {
/// <summary>
Expand Down
4 changes: 0 additions & 4 deletions MailKit/Security/SaslMechanismDigestMd5.cs
Original file line number Diff line number Diff line change
Expand Up @@ -34,10 +34,6 @@

using MimeKit.Utils;

#if NETSTANDARD1_3 || NETSTANDARD1_6
using MD5 = MimeKit.Cryptography.MD5;
#endif

namespace MailKit.Security {
/// <summary>
/// The DIGEST-MD5 SASL mechanism.
Expand Down
2 changes: 0 additions & 2 deletions UnitTests/Security/SslHandshakeExceptionTests.cs
Original file line number Diff line number Diff line change
Expand Up @@ -226,10 +226,8 @@ bool ValidateRemoteCertificate (object sender, X509Certificate certificate, X509

if (ServerCertificateValidationCallback != null) {
valid = ServerCertificateValidationCallback (hostName, certificate, chain, sslPolicyErrors);
#if !NETSTANDARD1_3 && !NETSTANDARD1_6
} else if (ServicePointManager.ServerCertificateValidationCallback != null) {
valid = ServicePointManager.ServerCertificateValidationCallback (hostName, certificate, chain, sslPolicyErrors);
#endif
} else {
valid = DefaultServerCertificateValidationCallback (hostName, certificate, chain, sslPolicyErrors);
}
Expand Down

0 comments on commit d70707d

Please sign in to comment.