diff options
author | danmosemsft <danmose@microsoft.com> | 2017-02-10 16:07:45 -0800 |
---|---|---|
committer | danmosemsft <danmose@microsoft.com> | 2017-02-10 21:36:03 -0800 |
commit | 6302d7a50884c6cf239e74bad85988be7403fe72 (patch) | |
tree | cad87e67d0555107867ffd98030f66b5ef53ad70 /src/vm/clsload.cpp | |
parent | 751771a8976f909af772e35c167bd7e3ffbe44c8 (diff) | |
download | coreclr-6302d7a50884c6cf239e74bad85988be7403fe72.tar.gz coreclr-6302d7a50884c6cf239e74bad85988be7403fe72.tar.bz2 coreclr-6302d7a50884c6cf239e74bad85988be7403fe72.zip |
Remove always undefined FEATURE_APTCA
Diffstat (limited to 'src/vm/clsload.cpp')
-rw-r--r-- | src/vm/clsload.cpp | 15 |
1 files changed, 0 insertions, 15 deletions
diff --git a/src/vm/clsload.cpp b/src/vm/clsload.cpp index fe74bf8a6f..fd7644ce98 100644 --- a/src/vm/clsload.cpp +++ b/src/vm/clsload.cpp @@ -5369,21 +5369,6 @@ void GetAccessExceptionAdditionalContextForSecurity(Assembly *pAccessingAssembly } #endif // FEATURE_CORECLR -#if defined(FEATURE_APTCA) && !defined(CROSSGEN_COMPILE) - // If the target assembly is conditionally APTCA, then it may needed to have been enabled in the domain - SString conditionalAptcaContext = Security::GetConditionalAptcaAccessExceptionContext(pTargetAssembly); - if (!conditionalAptcaContext.IsEmpty()) - { - pContextInformation->Append(conditionalAptcaContext); - } - - // If the target assembly is APTCA killbitted, then indicate that as well - SString aptcaKillBitContext = Security::GetAptcaKillBitAccessExceptionContext(pTargetAssembly); - if (!aptcaKillBitContext.IsEmpty()) - { - pContextInformation->Append(aptcaKillBitContext); - } -#endif // FEATURE_APTCA && !CROSSGEN_COMPILE } // Generate additional context about the root cause of an access exception which may help in debugging it (for |