Solved

Is this considered unmanaged code?

Posted on 2009-04-08
6
288 Views
Last Modified: 2012-05-06
I'm making use of Microsoft.Interop.Security.AzRoles.  I may catch a COMException in some locations.  Would this make some of my code considered as unmanaged?  In other words, does accessing COM related assemblies mean you are doing unmanaged code?  Seems you still get garbage collection.

Would unmanaged code be only anything using the DLLImport or unsafe blocks?

0
Comment
Question by:brettr
6 Comments
 
LVL 15

Assisted Solution

by:oobayly
oobayly earned 100 total points
ID: 24099639
According to this article, yes

"Code executing under the control of the runtime is called managed code. Conversely, code that runs outside the runtime is called unmanaged code. COM components, ActiveX interfaces, and Win32 API functions are examples of unmanaged code."
0
 

Author Comment

by:brettr
ID: 24099678
Don't understand.  My calls are in managed code.  The assemblies I'm calling are managed but have COM references somewhere I'm sure.  So what does that make my code?
0
 
LVL 3

Expert Comment

by:OutOfTouch
ID: 24099858
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Author Comment

by:brettr
ID: 24099993
Thanks.  I was looking for someone to answer my specific questions in their own words rather than providing links.

I see the azman DLL as about unmanaged as calls into System.Windows.Forms namespace.   Under the hood, it calls GDI+ but we don't say our code is unmanaged.  How close to the unmanaged implementation do you have to be before it is unmanaged?  The way I see it, if everything you are writing can be cleaned up by the runtime, it is managed code. Not exactly sure where that puts DLLImport. You might reference something like the azman API but those implicit COM object instances are disposed of automatically by the runtime because of how you referenced them.  Disagreements?
0
 
LVL 5

Accepted Solution

by:
burningmace earned 250 total points
ID: 24100343
I think you're misinterpreting the way .NET handles managed and unmanaged code. Say I were to declare FindWindow using DLLImport in a C# application, then call it with a pair of string variables. The string variables are managed. The FindWindow method (see code sample) itself is actually managed. When I call the FindWindow method, the [DLLImport("user32.dll"]) part tells InteropServices to translate the contents of the method parameters to unmanaged types and call the API. The core .NET framework itself is unmanaged because it is not written in VB.NET/C#/J#, but rather an unmanaged language such as C++.

A simple analogy is PHP. In PHP you cannot call GetFileSize in kernel32.dll, but you can get the PHP interpreter to call it for you using the filesize function. When you call it, PHP translates the file name string you gave it into a char* (or similar) and calls the appropriate APIs (OpenFile, GetFileSize, etc) to find the information it needs. It then translates the result into a format that can be used as a variable within the PHP script.
[DllImport("user32.dll", SetLastError = true)]

static extern IntPtr FindWindow(string lpClassName, string lpWindowName);

Open in new window

0
 
LVL 3

Assisted Solution

by:OutOfTouch
OutOfTouch earned 150 total points
ID: 24103194
Okay in my own words: Your code is managed code but your code is using an Interop assembly to call into unmangaged COM code. The interop assembly itself is managed code. The underlying COM api's being called are not managed code.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

For those of you who don't follow the news, or just happen to live under rocks, Microsoft Research released a beta SDK (http://www.microsoft.com/en-us/download/details.aspx?id=27876) for the Xbox 360 Kinect. If you don't know what a Kinect is (http:…
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now