473,406 Members | 2,451 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,406 software developers and data experts.

Fake a Assembly

Hello

I have a DLL A which accessing an other DLL B.
In my Application I use DLL A.

DLL B has a Strongname.
DLL A not.

I have no access to the sourcecode of DLL A.
And no Access to the sourcecode of DLL B.

Now I want to replace the DLL B by my own new DLL C.
I create the exactly same Namespaces Classes and Properties.
But get en error that the manifest is wrong if I run the Application.

System.IO.FileLoadException: The Manifestdefinition of the Assembly don't
mach with the Assemblyreference.

=== Pre-bind state information ===
LOG: DisplayName = DeCon.Data, Version=7.2.0.2102, Culture=neutral,
PublicKeyToken=33b483f429c47342
(Fully-specified)
LOG: Appbase = D:\Nu\Bin\
LOG: Initial PrivatePath = NULL
Calling assembly : DeConX.Tools, Version=2.0.2.0, Culture=neutral,
PublicKeyToken=null.
===

LOG: Redirect found in application configuration file: 7.2.0.2102 redirected
to 20.1.1.1.
LOG: Safe mode is set (applyPublisherPolicy=no).
LOG: Host configuration file not found.
LOG: Using machine configuration file from
C:\WINNT\Microsoft.NET\Framework\v1.1.4322\config\ machine.config.
LOG: Using codebase from policy file: file:///D:\Nu\Bin\DeCon.Data.dll
LOG: Post-policy reference: DeCon.Data, Version=20.1.1.1, Culture=neutral,
PublicKeyToken=33b483f429c47342

Then I created the Public Key out of the original DLL with the SN Tool

-e <assembly> <outfile>
Extract public key from <assembly> into <outfile>.
The use the *.snk in my own DLL.

But if I want to Compile the DLL I get an error that I have no Private
Key.......
Any Idea how to do this ?

Thanx

Nov 20 '05 #1
1 2090
Okay, thanx

I found the answer

I Forget

<Assembly: AssemblyDelaySignAttribute(True)>

now it works :-)
"Armin" <Ar***@humsoft.com> schrieb im Newsbeitrag
news:bi*************@news.t-online.com...
Hello

I have a DLL A which accessing an other DLL B.
In my Application I use DLL A.

DLL B has a Strongname.
DLL A not.

I have no access to the sourcecode of DLL A.
And no Access to the sourcecode of DLL B.

Now I want to replace the DLL B by my own new DLL C.
I create the exactly same Namespaces Classes and Properties.
But get en error that the manifest is wrong if I run the Application.

System.IO.FileLoadException: The Manifestdefinition of the Assembly don't
mach with the Assemblyreference.

=== Pre-bind state information ===
LOG: DisplayName = DeCon.Data, Version=7.2.0.2102, Culture=neutral,
PublicKeyToken=33b483f429c47342
(Fully-specified)
LOG: Appbase = D:\Nu\Bin\
LOG: Initial PrivatePath = NULL
Calling assembly : DeConX.Tools, Version=2.0.2.0, Culture=neutral,
PublicKeyToken=null.
===

LOG: Redirect found in application configuration file: 7.2.0.2102 redirected to 20.1.1.1.
LOG: Safe mode is set (applyPublisherPolicy=no).
LOG: Host configuration file not found.
LOG: Using machine configuration file from
C:\WINNT\Microsoft.NET\Framework\v1.1.4322\config\ machine.config.
LOG: Using codebase from policy file: file:///D:\Nu\Bin\DeCon.Data.dll
LOG: Post-policy reference: DeCon.Data, Version=20.1.1.1, Culture=neutral, PublicKeyToken=33b483f429c47342

Then I created the Public Key out of the original DLL with the SN Tool

-e <assembly> <outfile>
Extract public key from <assembly> into <outfile>.
The use the *.snk in my own DLL.

But if I want to Compile the DLL I get an error that I have no Private
Key.......
Any Idea how to do this ?

Thanx

Nov 20 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Fakhar | last post by:
Hi All, How can I check fake requests on my webpage. I am asking for email address as input and I wounder if anyone write a program to send fake requests and my system will be busy to respond...
1
by: Bryan Parkoff | last post by:
I work emulator project using 32 Bit emulated processor. The problem is that it attempts to allocate 4GB memory because some people want to use emulated instruction to read data from 4GB memory. ...
9
by: bubbakittee | last post by:
I am designing a package of functions to be used by people with very little programming experience (if any) and very little patience. I don't want to scare them with programmerish words like...
22
by: Ricky W. Hunt | last post by:
First, the subject probably doesn't use the correct terms but I'm not sure what it's called in VB. I'm writing a media player app. The subroutine that handles the "open file" button contains an...
5
by: mwebel | last post by:
Hi, is is also a C question but the program im writing is in C++ and it applies as well so: i have a program in the "main(int argc, const char ** argv)" and i want to make a library. for...
10
by: Konstantin Andreev | last post by:
Hello. Some time ago I asked in this conference, - How to use an ONLINE BACKUP to restore database onto another system? - but got no answers. Therefore I can conclude it is not possible. But......
3
by: kyildiz | last post by:
Hi, I had written a program long time ago that loaded a web site and parsed the info on that web site and created a database about the information. Then the comapny that maintains the web site...
1
by: John Bode | last post by:
I need a way to fake reflection in C++ code that makes as few assumptions about the data types involved as possible. I suspect there is no good answer for what I need to do, but I'll present the...
6
by: oaklander | last post by:
I have this part of a class that outputs fake data in my Tomcat 4.17 container. Now I want to substitute the fake data for real data that fetches the field value of lastname records from the Oracle...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.