diff options
Diffstat (limited to 'src/vm/securitymeta.h')
-rw-r--r-- | src/vm/securitymeta.h | 18 |
1 files changed, 2 insertions, 16 deletions
diff --git a/src/vm/securitymeta.h b/src/vm/securitymeta.h index d78b7bde54..8247204e56 100644 --- a/src/vm/securitymeta.h +++ b/src/vm/securitymeta.h @@ -158,10 +158,6 @@ inline SecurityRuleSet GetSecurityRuleSet(TokenSecurityDescriptorFlags flags); // Encode a security rule set into token flags - this reverses GetSecurityRuleSet inline TokenSecurityDescriptorFlags EncodeSecurityRuleSet(SecurityRuleSet ruleSet); -#ifdef FEATURE_APTCA -TokenSecurityDescriptorFlags ParseAptcaAttribute(const BYTE *pbAptcaBlob, - DWORD cbAptcaBlob); -#endif // FEATURE_APTCA TokenSecurityDescriptorFlags ParseSecurityRulesAttribute(const BYTE *pbSecurityRulesBlob, DWORD cbSecurityRulesBlob); @@ -575,9 +571,6 @@ inline ModuleSecurityDescriptorFlags operator&=(ModuleSecurityDescriptorFlags& l inline ModuleSecurityDescriptorFlags operator~(ModuleSecurityDescriptorFlags flags); -#ifdef FEATURE_APTCA -BOOL CheckAssemblyHasBeenKillBitted(LPASSEMBLYNAME pAssemblyName, ULARGE_INTEGER uliFileVersion); -#endif // Module security descriptor, this class contains static security information about the module // this information will get persisted in the NGen image @@ -636,19 +629,12 @@ public: // Get the rule set the assembly uses inline SecurityRuleSet GetSecurityRuleSet(); -#ifndef FEATURE_CORECLR - // Can fully trusted transparent code bypass verification - inline BOOL CanTransparentCodeSkipVerification(); -#endif // !FEATURE_CORECLR -#if defined(FEATURE_APTCA) || defined(FEATURE_CORESYSTEM) +#if defined(FEATURE_CORESYSTEM) // Does the assembly allow partially trusted callers inline BOOL IsAPTCA(); -#endif // defined(FEATURE_APTCA) || defined(FEATURE_CORESYSTEM) +#endif // defined(FEATURE_CORESYSTEM) -#ifndef FEATURE_CORECLR - BOOL AssemblyVersionRequiresLegacyTransparency(); -#endif // !FEATURE_CORECLR private: // Helper class which fires transparency calculation begin/end ETW events |