Solved

Create a strong name for an Assembly for without original source code?

Posted on 2004-08-16
4
1,346 Views
Last Modified: 2012-05-05
I've inherited a component that has a reference to a .NET assembly that does not have a strong name. I do not have the source code for the referenced assembly but wish to make it strongly named. The reason for this is that I keep getting the following error when calling this component which contains a reference to an assembly which is not strongly named:

TestHarness.exe is an executable that contains a reference to a strongly named dot net assembly called Foo.dll
Foo.dll contains a reference to a .NET assembly 'Bar' which is not strongly named.

An unhandled exception of type 'System.IO.FileLoadException' occurred in TestHarness.exe

Additional information: The located assembly 'Bar' is not strongly named.

Is it possible to generate a strong name for a .NET component without having the source-code? I've seen some command line tools and tried sn.exe etc but none seem to be able to do this.

I thought a workaround would be to make the referenced assembly strongly named but I do not have the source code.

Or is there another way around this problem using code?

500 points on offer for a solution to put me out of my misery!

Jon
0
Comment
Question by:jgianni
4 Comments
 
LVL 4

Expert Comment

by:Jigit
ID: 11808883
jgianni, in order to compile your assembly with strong name you do not need sources of other assemblies. Only their *.snk file is needed for this purpose. The file contains information about the cryptograffic key. Use the below link for more information:
http://www.dotnetspider.com/Technology/KBPages/406.aspx

HTH,
Jigit
0
 

Author Comment

by:jgianni
ID: 11808922
sorted it myself now - original components were Java class files and resolved by using Jbimp with keyfile switch.

Thanks for the help anyway.
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 12117148
PAQed, with points refunded (500)

Computer101
E-E Admin
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Email Body 4 47
asp.net mvc5 3 38
index Out OF Range Exception error 4 32
fomat Json objects 6 18
Introduction This article series is supposed to shed some light on the use of IDisposable and objects that inherit from it. In essence, a more apt title for this article would be: using (IDisposable) {}. I’m just not sure how many people would ge…
This article introduced a TextBox that supports transparent background.   Introduction TextBox is the most widely used control component in GUI design. Most GUI controls do not support transparent background and more or less do not have the…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now