diff options
Diffstat (limited to 'src/vm/securitymeta.inl')
-rw-r--r-- | src/vm/securitymeta.inl | 41 |
1 files changed, 0 insertions, 41 deletions
diff --git a/src/vm/securitymeta.inl b/src/vm/securitymeta.inl index 6eb488d78c..11da444841 100644 --- a/src/vm/securitymeta.inl +++ b/src/vm/securitymeta.inl @@ -411,30 +411,8 @@ inline BOOL MethodSecurityDescriptor::IsDeclSecurityCASDemandsOnly(DWORD dwMethD } CONTRACTL_END; -#ifdef FEATURE_CORECLR // Non-CAS demands are not supported in CoreCLR return TRUE; -#else - GCX_COOP(); - - PsetCacheEntry *tokenSetIndexes[dclMaximumValue + 1]; - SecurityDeclarative::DetectDeclActionsOnToken(_mdToken, dwMethDeclFlags, tokenSetIndexes, pInternalImport); - SecurityProperties sp(dwMethDeclFlags); - if (!sp.FDemandsOnly()) - return FALSE; - - DWORD dwLocalAction; - bool builtInCASPermsOnly = true; - for (dwLocalAction = 0; dwLocalAction <= dclMaximumValue && builtInCASPermsOnly; dwLocalAction++) - { - if (tokenSetIndexes[dwLocalAction] != NULL) - { - builtInCASPermsOnly = builtInCASPermsOnly && (tokenSetIndexes[dwLocalAction]->ContainsBuiltinCASPermsOnly(dwLocalAction)); - } - } - - return (builtInCASPermsOnly); // we only get here if there are only demands...so it suffices to return this value directly -#endif } #ifndef DACCESS_COMPILE @@ -632,9 +610,6 @@ inline BOOL TypeSecurityDescriptor::IsCritical() } return pClass->IsAllCritical() -#ifndef FEATURE_CORECLR - || pClass->IsCritical() -#endif // !FEATURE_CORECLR ; } @@ -1101,16 +1076,6 @@ inline BOOL ModuleSecurityDescriptor::IsMixedTransparency() return !IsAllCritical() && !IsAllTransparent(); } -#ifndef FEATURE_CORECLR - -inline BOOL ModuleSecurityDescriptor::CanTransparentCodeSkipVerification() -{ - WRAPPER_NO_CONTRACT; - VerifyDataComputed(); - return !!(m_flags & ModuleSecurityDescriptorFlags_SkipFullTrustVerification); -} - -#endif // !FEATURE_CORECLR #if defined(FEATURE_CORESYSTEM) inline BOOL ModuleSecurityDescriptor::IsAPTCA() @@ -1139,12 +1104,6 @@ inline SecurityRuleSet ModuleSecurityDescriptor::GetSecurityRuleSet() { return ::GetSecurityRuleSet(tokenFlags); } -#ifndef FEATURE_CORECLR - else if (AssemblyVersionRequiresLegacyTransparency()) - { - return SecurityRuleSet_Level1; - } -#endif // !FEATURE_CORECLR else { // The assembly hasn't specified the rule set that it needs to use. We'll just use the default rule |