Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Khi hai hội đồng có số lượng lớn hoặc nhỏ khác nhau, họ được coi là không tương thích. Khi họ có khác nhau xây dựng số, họ có thể hoặc có thể không tương thích, và khi họ có số sửa đổi khác nhau, họ được coi là chắc chắn tương thích với nhau. | Programming C 2nd Edition When two assemblies have different major or minor numbers they are considered to be incompatible. When they have different build numbers they might or might not be compatible and when they have different revision numbers they are considered definitely compatible with each other. Revision numbers are intended for bug fixes. If you fix a bug and are prepared to certify that your DLL is fully backward-compatible with the existing version you should increment the revision. When an application loads an assembly it specifies the major and minor version that it wants and the AssemblyResoiverfinds the highest build and revision numbers. 17.8.3 Strong Names In order to use a shared assembly you must meet three requirements You need to be able to specify the exact assembly you want to load. Therefore you need a globally unique name for the shared assembly. You need to ensure that the assembly has not been tampered with. That is you need a digital signature for the assembly when it is built. You need to ensure that the assembly you are loading is the one authored by the actual creator of the assembly. You therefore need to record the identity of the originator. All these requirements are met by strong names. Strong names must be globally unique and use public key encryption to ensure that the assembly hasn t been tampered with and was written by the creator. A strong name is a string of hexadecimal digits and is not meant to be human-readable. To create a strong name a public-private key pair is generated for the assembly. A hash is taken of the names and contents of the files in the assembly. The hash is then encrypted with the private key for the assembly and placed in the manifest. This is known as signing the assembly. The public key is incorporated into the strong name of the assembly. Public Key Encryption Strong names are based on public key encryption technology. The essence of public key encryption is that your data is encoded with a complex