||The Secrets of Strong Naming|
|Subject:||Figure 3 is correct|
Response to: Figure 3 should say private key
|Including the private key in the assembly would make the whole process pointless. The private key is used to encrypt the hash. The encrypted hash and public key are stored in the assembly. That is what the text above the figure says and the figure correctly reflects the text.|
Showing messages 1 through 1 of 1.
Figure 3 is correct
2003-07-27 20:28:48 anonymous2 [View]