473,387 Members | 1,485 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Receiving a strong name error when trying to access a library

I receive the following error 'Request for the permission of type
System.Security.Permissions.StrongNameIdentityPerm ission, mscorlib,
Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
failed.' when I try to access a property or method of the library. I
was wondering if the library is secure with a key, so the caller has to
be sign with same key or I'm calling the library incorrectly. Do I need
an assembly tag with in code?

I'm attempting to add functionality to a product by adding inline C#
code to a ASP.Net control. The software does not have a published SDK
but I can determine how to use the libaries from previous versions. Any
help is greatly appreciated and links to documentation or explanation
are great helps for learning.

Thank you for the time,

Robert Pottschmidt

Below is the code sample:
....
Software.DataLayer.One a;
Software.BusinessLogic.Two b;
a =(Software.Libary.One) Session["XXXXX"];
a = l.Inbox; //The code blows up here with the above error
....
PermView of the classes:

C:\Documents and Settings\rob>permview /decl Software.Libary.dll

Microsoft (R) .NET Framework Permission Request Viewer. Version
1.1.4322.573
Copyright (C) Microsoft Corporation 1998-2002. All rights reserved.

Class Software.DataLayer.One LinktimeDemand permission set:
<PermissionSet class="System.Security.PermissionSet"
version="1">
<IPermission
class="System.Security.Permissions.StrongNameIdent ityPermission,
mscorlib, Version=1.0.5000.0, Culture=neutral,
PublicKeyToken=b77a5c561934e089"
version="1"

PublicKeyBlob="00240000048000009400000006020000002 40000525341310
0040000010001007F850AB9C51768C40BB2BC90AC0E7A733B0 717D1139F2BDE487A76A8FA93E887D
2CB0B63EF25B401038A7A48CA5DB638EFD867515D8219EF8A5 8F3B1D098C89C278F6078789564F1F
6F6C088729F4D0D3BEE66E923A49B9A22E3404837A14E5DDB1 AC258BB0C122329B06E531E05CF2E7
214936E57EE0F998BC093AD2C351BB9"/>
</PermissionSet>

Jul 21 '05 #1
0 1132

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Jason Garland \(Secure Access Pty Ltd\) | last post by:
Hi I am trying to work out how to either create a strong name wrapper for AxInterop.SHDocVw.dll I have researched the following : - 'Wrapper Assembly Key' but this is apparently for c#...
20
by: Razzie | last post by:
Hey all, I'm really going through a small hell right now - I've completely lost it :) I made a project, using two interop libraries from exchange (created them as in this msdn article:...
3
by: Patrick Kowalzick | last post by:
Dear NG, I am trying to build a strong named library with Visual C++. -Therefore I am generating a key pair using sn -k strong_name.snk -Create a new Project in the Visual Studio: Visual...
6
by: Manuel Lopez | last post by:
Hello, I have a Web Project (UserControls.dll) with some user controls that is shared by many asp.net web applicattions. What we do is copy UserControls.dll to all the applications bin...
3
by: Brian | last post by:
Is there a way to compile a program using strong name and a key file while including an outlook dll? Everytime I attempt to compile I get the following error. Unable to emit assembly:...
0
by: pottschmidtr | last post by:
I receive the following error 'Request for the permission of type System.Security.Permissions.StrongNameIdentityPermission, mscorlib, Version=1.0.5000.0, Culture=neutral,...
1
by: Michael | last post by:
Help please Trying to strong name sign my project within the Assembly using the KeyFileAttribute with a sn generated key and getting an error message that one of the referenced dll's...
8
by: per9000 | last post by:
Dear readers, I have some problems with strong keys. What I want to do is basically this. A - create an application (f.x. strongHello.dll) with a strong key. B - import the functions of this...
6
by: raylopez99 | last post by:
Anybody use Strong Name Signing? I think this is used by default for Resource files, which is one reason perhaps I can't get my resource files to work (somehow the public key is messed up, perhaps...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.