summaryrefslogtreecommitdiff
path: root/src/vm/clsload.cpp
diff options
context:
space:
mode:
authordanmosemsft <danmose@microsoft.com>2017-02-10 16:07:45 -0800
committerdanmosemsft <danmose@microsoft.com>2017-02-10 21:36:03 -0800
commit6302d7a50884c6cf239e74bad85988be7403fe72 (patch)
treecad87e67d0555107867ffd98030f66b5ef53ad70 /src/vm/clsload.cpp
parent751771a8976f909af772e35c167bd7e3ffbe44c8 (diff)
downloadcoreclr-6302d7a50884c6cf239e74bad85988be7403fe72.tar.gz
coreclr-6302d7a50884c6cf239e74bad85988be7403fe72.tar.bz2
coreclr-6302d7a50884c6cf239e74bad85988be7403fe72.zip
Remove always undefined FEATURE_APTCA
Diffstat (limited to 'src/vm/clsload.cpp')
-rw-r--r--src/vm/clsload.cpp15
1 files changed, 0 insertions, 15 deletions
diff --git a/src/vm/clsload.cpp b/src/vm/clsload.cpp
index fe74bf8a6f..fd7644ce98 100644
--- a/src/vm/clsload.cpp
+++ b/src/vm/clsload.cpp
@@ -5369,21 +5369,6 @@ void GetAccessExceptionAdditionalContextForSecurity(Assembly *pAccessingAssembly
}
#endif // FEATURE_CORECLR
-#if defined(FEATURE_APTCA) && !defined(CROSSGEN_COMPILE)
- // If the target assembly is conditionally APTCA, then it may needed to have been enabled in the domain
- SString conditionalAptcaContext = Security::GetConditionalAptcaAccessExceptionContext(pTargetAssembly);
- if (!conditionalAptcaContext.IsEmpty())
- {
- pContextInformation->Append(conditionalAptcaContext);
- }
-
- // If the target assembly is APTCA killbitted, then indicate that as well
- SString aptcaKillBitContext = Security::GetAptcaKillBitAccessExceptionContext(pTargetAssembly);
- if (!aptcaKillBitContext.IsEmpty())
- {
- pContextInformation->Append(aptcaKillBitContext);
- }
-#endif // FEATURE_APTCA && !CROSSGEN_COMPILE
}
// Generate additional context about the root cause of an access exception which may help in debugging it (for