473,396 Members | 2,018 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

WSE523: The CipherData contents are invalid.

Hi,

I am using WSE 2.0 SP3. I am getting the following error when
concurrent requests are made to the same web service.

The signature or decryption was invalid --->
System.Security.Cryptography.CryptographicExceptio n: WSE523: The
CipherData contents are invalid.

at
Microsoft.Web.Services2.Security.Cryptography.Symm etricEncryptionFormatter.Decrypt(Byte[]
cipherText)

at Microsoft.Web.Services2.Security.EncryptedData.Dec rypt()

--- End of inner exception stack trace ---

at Microsoft.Web.Services2.Security.EncryptedData.Dec rypt()

at Microsoft.Web.Services2.Security.Security.LoadXml( XmlElement
element)

at
Microsoft.Web.Services2.Security.SecurityInputFilt er.ProcessMessage(SoapEnvelope
envelope)

at
Microsoft.Web.Services2.Pipeline.ProcessInputMessa ge(SoapEnvelope
envelope)

at
Microsoft.Web.Services2.WebServicesExtension.Befor eDeserializeServer(SoapServerMessage
message)

Stack Trace Is : at
System.Web.Services.Protocols.SoapHttpClientProtoc ol.ReadResponse(SoapClientMessage
message, WebResponse response, Stream responseStream, Boolean
asyncCall)

at
System.Web.Services.Protocols.SoapHttpClientProtoc ol.Invoke(String
methodName, Object[] parameters)

at
Comerica.CAS.Services.WSDelegate.WSAuthenticationD elegate.GetUserByLoginId(String
loginId)
Please help me with this. What could be the reason? This happens only
if concurrent requests are made to the same webservice.

Thanks in Advance..

Raj

May 14 '07 #1
0 1561

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: muser | last post by:
Karl this is albeit your program, in the program that you wrote for me I learned quite alot, i didn't realise I could return NULL for instance or even use functions without first declaring them,...
1
by: Rostov | last post by:
I've got a script where I'm trying to toggle the visibility of a div node by a click on an image that is the sibling of the div. So I've got this HTML: <div> <img...
17
by: Phill Long | last post by:
Right, ok, well I have designed a form that will display a price (22.34) in a text box, and another price in the other text box... I also have a blank text box... Now I want to add both the prices...
3
by: scoop_77 | last post by:
I'm looking for some software that would allow me to point to a folder in Windows Explorer, and have it output an html file with hyperlinks to all of the files within that folder and all of the...
20
by: Scott Orsburn | last post by:
Is there a way to load the contents returned from a URL into a JavaScript variable? Suppose a user picks an option from a popup list. I want to pass that choice in a URL to a script on a server...
1
by: Steve Remer | last post by:
My application (relevant code snippets below) originally used Session variables in order to maintain state from page to page. After being unable to solve the mystery of why those variables were...
2
by: Joe Kovac | last post by:
Hi! I have many pages that expect query strings. One of the first things to do, should be to check if the values of the QueryString are valid. But how should I react on invalid/missing...
1
by: qbp90x5lb | last post by:
I'm using an XSLT transform to output the element value contents from a simple XML file into a new .TXT file. Everything works fine except for certain XML files, when calling msxsl with the .xslt, I...
2
by: Cirene | last post by:
My ASP.NET project builds fine (VS2008). I added a new web deployment project. When I try to build it I get: Data at the root level is invalid. Line1, position 1. (The file is web.config,...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.